DavidBuchanan314 / pwn-mbrLinks
A simple MBR hijack demonstration
☆179Updated 2 years ago
Alternatives and similar repositories for pwn-mbr
Users that are interested in pwn-mbr are comparing it to the libraries listed below
Sorting:
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆169Updated 8 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆232Updated 3 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Updated 6 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- Cross Architecture Shellcode in C☆205Updated 9 years ago
- A novel technique to hide code from debuggers & disassemblers☆157Updated last year
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79Updated 7 years ago
- C++-based shellcode builder☆115Updated 4 years ago
- PEI stage backdoor for UEFI compatible firmware☆227Updated 4 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- Fentanyl is an IDAPython script that makes patching significantly easier☆211Updated 2 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Updated 11 months ago
- Tools, documentation and scripts to move projects from IDA to R2 and viceversa☆135Updated 5 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆406Updated 10 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- windows kernel vulnerability found by me☆90Updated 8 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆85Updated 3 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Updated 6 years ago
- ☆92Updated 7 years ago
- Decompiler for x86 and x86-64 ELF binaries☆221Updated 6 years ago
- Patching ROP-encoded shellcodes into PEs☆189Updated 7 years ago