Cr4sh / r0akLinks
r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
☆11Updated 7 years ago
Alternatives and similar repositories for r0ak
Users that are interested in r0ak are comparing it to the libraries listed below
Sorting:
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- NT AUTHORITY\SYSTEM☆42Updated 5 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 2 months ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 5 months ago
- Antivirus Emulator Fingerprints☆30Updated 7 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- ☆22Updated 5 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- Infects PE files with a shellcode☆20Updated 7 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆20Updated last year
- Example for PagedOut!☆25Updated 6 years ago
- ☆31Updated 5 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆50Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆13Updated 4 months ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆29Updated 7 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆28Updated 8 years ago
- ☆36Updated 3 years ago
- Exploits I've authored☆60Updated 6 years ago
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- ☆37Updated 6 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago