DavidBuchanan314 / pwn-mbrLinks
A simple MBR hijack demonstration
☆180Updated 3 years ago
Alternatives and similar repositories for pwn-mbr
Users that are interested in pwn-mbr are comparing it to the libraries listed below
Sorting:
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 7 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Updated 8 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆234Updated 3 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆169Updated 9 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Updated 6 years ago
- Windows XP 32-Bit Bootkit☆146Updated 11 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆131Updated 3 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆407Updated 11 years ago
- Cross Architecture Shellcode in C☆208Updated 9 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- ☆137Updated 4 years ago
- sample linux x86_64 ELF virus☆54Updated 7 years ago
- PEI stage backdoor for UEFI compatible firmware☆227Updated 4 years ago
- C++-based shellcode builder☆115Updated 5 years ago
- linux rootkit☆162Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆97Updated 9 years ago
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 9 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated last year
- windows kernel vulnerability found by me☆90Updated 8 years ago
- ☆92Updated 8 years ago
- Patching ROP-encoded shellcodes into PEs☆190Updated 8 years ago
- HORSEPILL rootkit PoC☆230Updated 9 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago