DavidBuchanan314 / pwn-mbrLinks
A simple MBR hijack demonstration
☆181Updated 2 years ago
Alternatives and similar repositories for pwn-mbr
Users that are interested in pwn-mbr are comparing it to the libraries listed below
Sorting:
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 10 months ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 7 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- PEI stage backdoor for UEFI compatible firmware☆221Updated 4 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- Patching ROP-encoded shellcodes into PEs☆187Updated 7 years ago
- Cross Architecture Shellcode in C☆201Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆76Updated 7 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- ☆138Updated 3 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- my public code☆166Updated 8 years ago
- linux rootkit☆160Updated 7 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆405Updated 10 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated 11 months ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- ZeroAccess v3 toolkit☆164Updated 7 years ago
- libpcap based ICMP encrypted backdoor for linux.☆131Updated 4 years ago
- A General Purpose DLL & Code Injection Utility☆154Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆133Updated 9 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- A pintool in order to unpack malware☆235Updated 8 years ago