DanielAvinoam / WindowsKernelProgrammingBook
Projects I did during the reading of @zodiacon's Windows Kernel Programming book
☆10Updated 3 years ago
Alternatives and similar repositories for WindowsKernelProgrammingBook:
Users that are interested in WindowsKernelProgrammingBook are comparing it to the libraries listed below
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 9 months ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- the Open Source and Pure C++ Packer for eXecutables☆18Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- ☆31Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆26Updated last month
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆42Updated last year
- 关闭恶意驱动的文件和注册表保护☆12Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- Unpacker for donut shellcode☆17Updated 4 years ago
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆13Updated 7 months ago
- Rookit and anti rookit on Windows platform☆12Updated 9 months ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- ☆12Updated last year
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆21Updated 4 years ago
- Released presentations of my talks + code that used during these talks☆13Updated 5 months ago
- A simple PE loader.☆25Updated 2 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆19Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆36Updated last year
- ☆50Updated 2 years ago
- ☆15Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆27Updated 3 years ago
- ☆22Updated last year
- ☆29Updated last year
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆21Updated last year
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆37Updated 2 years ago