User-mode part of Zerokit platform
☆22Mar 30, 2019Updated 6 years ago
Alternatives and similar repositories for possessor
Users that are interested in possessor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆29Mar 31, 2017Updated 8 years ago
- A loadable dll that tracks memory changes, IAT hooks, and dynamically emplaced "JMP" in the x86 host executable.☆12Oct 22, 2023Updated 2 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆27Feb 20, 2019Updated 7 years ago
- map driver to memory☆26Aug 26, 2018Updated 7 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- MS17-010 Tester☆13May 20, 2017Updated 8 years ago
- win7 apc注入不支持win10☆18Mar 29, 2019Updated 6 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Windows Hypervisor Platform client☆31Jun 13, 2018Updated 7 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- (This is a fork used primarily to submit patches into upstream repository) RpcView is a free tool to explore and decompile Microsoft RPC …☆19May 27, 2023Updated 2 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- User-mode program parsing logs created by HyperPlatform☆19Aug 15, 2016Updated 9 years ago
- a sandbox project by sudami☆17Jul 31, 2018Updated 7 years ago
- The Windows 10 LPE exploit written by SandboxEscaper☆110Oct 2, 2018Updated 7 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 6 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- The Visual Studio extension that measures load time of each project when a solution file is opened.☆17Jan 5, 2019Updated 7 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Kindly Win x86/x64 DLL Injector☆15Aug 17, 2019Updated 6 years ago
- lz77win sources!lz77 is the compression software for the windows platform.☆24Apr 16, 2019Updated 6 years ago