DavidBuchanan314 / pwn-mbrLinks
A simple MBR hijack demonstration
☆180Updated 3 years ago
Alternatives and similar repositories for pwn-mbr
Users that are interested in pwn-mbr are comparing it to the libraries listed below
Sorting:
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆233Updated 3 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- A novel technique to hide code from debuggers & disassemblers☆158Updated last year
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆169Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Cross Architecture Shellcode in C☆206Updated 9 years ago
- C++-based shellcode builder☆115Updated 4 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- PEI stage backdoor for UEFI compatible firmware☆228Updated 4 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆405Updated 10 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- ☆137Updated 4 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆86Updated 9 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 11 months ago
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- HORSEPILL rootkit PoC☆229Updated 9 years ago
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago