DavidBuchanan314 / pwn-mbr
A simple MBR hijack demonstration
☆176Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for pwn-mbr
- Cross Architecture Shellcode in C☆198Updated 8 years ago
- PEI stage backdoor for UEFI compatible firmware☆209Updated 3 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆159Updated 7 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆180Updated 5 years ago
- Implementation of the SMM rootkit "The Watcher"☆123Updated 2 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 6 years ago
- HORSEPILL rootkit PoC☆223Updated 8 years ago
- Decompiler for x86 and x86-64 ELF binaries☆216Updated 5 years ago
- A tool for checking exploitability☆210Updated 5 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated last year
- UEFI bootkit☆236Updated 11 years ago
- Content from presentation at BHUSA 2017☆179Updated 7 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆223Updated 2 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆133Updated 5 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- An attempt at Process Doppelgänging☆183Updated 6 years ago
- A novel technique to hide code from debuggers & disassemblers☆152Updated 3 months ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 7 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆143Updated 7 years ago
- Conference slides and White-papers☆356Updated 4 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆422Updated 6 years ago
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆411Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆129Updated 6 years ago
- Windows XP 32-Bit Bootkit☆142Updated 9 years ago