Cr4sh / r0ak
r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
☆10Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for r0ak
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Another Portable Executable files analysing stuff☆18Updated 13 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Performance Monitor Volatile Environment LPE☆17Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated last month
- ☆11Updated 5 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 2 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆30Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆67Updated 3 years ago
- Sysprep Volatile Environment LPE (2017)☆13Updated 2 years ago
- A small library helping to parse commandline parameters (for C/C++)☆53Updated last year
- ☆31Updated 4 years ago
- Infects PE files with a shellcode☆15Updated 6 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆11Updated 2 years ago
- Example for PagedOut!☆24Updated 5 years ago
- TaskMgr Volatile Environment LPE☆12Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- ☆27Updated 2 years ago