r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
☆11Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for r0ak
Users that are interested in r0ak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14May 14, 2022Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- System Management RAM analysis tool☆83Aug 9, 2024Updated last year
- Simple standalone bundle of NT core APIs☆25Mar 7, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- Extracts the files embedded inside of a .NET AppHost.☆19Dec 13, 2025Updated 4 months ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 7 years ago
- Windows Research Kernel☆37Sep 22, 2025Updated 6 months ago
- Windows Crypter/Decrypter Generator with AES 256 bits key - Fully Undetectable (FUD)☆18May 18, 2020Updated 5 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- software for the Girl Tech IM-Me☆12Mar 19, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆360Nov 3, 2023Updated 2 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 7 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- Encrypt/decrypt files and directories using your YubiKey☆16Sep 24, 2023Updated 2 years ago
- Research on the Lenovo BIOS firmware.☆14Feb 28, 2021Updated 5 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Windows PDB Parser using Imagehlp library.☆16Sep 16, 2022Updated 3 years ago
- Python code for Beaglebone Green Wireless - 3d Area Scanning☆16Mar 10, 2025Updated last year
- Dis interpreter by Rob Pike☆13Sep 3, 2020Updated 5 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- TCCBOOT: TinyCC Boot Loader☆14Oct 24, 2014Updated 11 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- kernel callback removal (Bypassing EDR Detections)☆214Nov 14, 2025Updated 5 months ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated 2 months ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- Now I shall sing the second kingdom there where the soul of man is cleansed, made worthy to ascend to Heaven.☆13Updated this week
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- A tool to showcase the Therac-25 bugs☆12Jun 11, 2019Updated 6 years ago