r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
☆11Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for r0ak
Users that are interested in r0ak are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14May 14, 2022Updated 3 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Simple standalone bundle of NT core APIs☆25Mar 7, 2016Updated 10 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- Extracts the files embedded inside of a .NET AppHost.☆20Dec 13, 2025Updated 3 months ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key - Fully Undetectable (FUD)☆18May 18, 2020Updated 5 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- python to tax form compiler☆12Jun 6, 2022Updated 3 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 7 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Mar 1, 2016Updated 10 years ago
- Encrypt/decrypt files and directories using your YubiKey☆16Sep 24, 2023Updated 2 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Set Lenovo BIOS settings through Intune and PowerShell☆14Oct 30, 2021Updated 4 years ago
- ☆12Sep 22, 2021Updated 4 years ago
- an iSCSI demo driver for Windows☆12Sep 21, 2015Updated 10 years ago
- PEI stage backdoor for UEFI compatible firmware☆226May 1, 2021Updated 4 years ago
- PSP Homebrew Sorter☆12Mar 31, 2021Updated 4 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Windows PDB Parser using Imagehlp library.☆16Sep 16, 2022Updated 3 years ago
- Dis interpreter by Rob Pike☆13Sep 3, 2020Updated 5 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TCCBOOT: TinyCC Boot Loader☆14Oct 24, 2014Updated 11 years ago
- file tree union server for Plan 9☆10Aug 6, 2021Updated 4 years ago
- Reverse SSH C2☆35Sep 19, 2025Updated 6 months ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- kernel callback removal (Bypassing EDR Detections)☆211Nov 14, 2025Updated 4 months ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- WizardsToolkit is a secure C library offering cross-platform cryptography, hashing, authentication, and data integrity tools. It supports…☆16Feb 16, 2026Updated last month