A simple MBR hijack demonstration
☆181Oct 22, 2022Updated 3 years ago
Alternatives and similar repositories for pwn-mbr
Users that are interested in pwn-mbr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Gozi-MBR-rootkit Bootkit Modified☆69Oct 25, 2016Updated 9 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Apr 17, 2021Updated 4 years ago
- ☆82Dec 3, 2017Updated 8 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- 感染MBR 下载并运行文 件。☆33Aug 23, 2022Updated 3 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Aug 12, 2015Updated 10 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆118Dec 12, 2019Updated 6 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Jul 22, 2016Updated 9 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- IntelVT-X nice feature -> tool☆95Jul 2, 2014Updated 11 years ago
- The old integrity check bypass made by dude719.☆13Apr 2, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- ☆19Jun 20, 2019Updated 6 years ago
- Windows Crypt API hook to generate weak keys☆47Nov 1, 2016Updated 9 years ago
- ☆48Jun 19, 2017Updated 8 years ago
- 几个UAC Bypass的方法☆12Apr 13, 2018Updated 7 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Windows Hypervisor Platform client☆31Jun 13, 2018Updated 7 years ago
- ☆18Mar 28, 2015Updated 10 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆172Dec 7, 2016Updated 9 years ago
- deprecated☆46Mar 20, 2019Updated 7 years ago
- Elevation of privilege detector based on HyperPlatform☆124Mar 5, 2017Updated 9 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago