Cr4sh / r0ak
r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
☆10Updated 6 years ago
Alternatives and similar repositories for r0ak:
Users that are interested in r0ak are comparing it to the libraries listed below
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 4 months ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated 2 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆41Updated 6 months ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year
- Neutralize KEPServerEX anti-debugging techniques☆31Updated 2 years ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- ☆22Updated 4 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- A simple PE loader.☆25Updated 2 years ago
- really ?☆12Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated last month
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Example for PagedOut!☆24Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- ☆25Updated 2 years ago
- ☆31Updated 4 years ago