DissectMalware / WinNativeIO
Using Undocumented NTDLL Functions to Read/Write/Delete File
☆18Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for WinNativeIO
- KernelBugTest☆15Updated 6 years ago
- hooking KiUserApcDispatcher☆22Updated 7 years ago
- Windows x64 Process Scanner to detect application compatability shims☆36Updated 6 years ago
- Resources from my journey into Windows binary exploitation☆22Updated 5 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 9 years ago
- ☆18Updated 9 years ago
- An opensource API hooking framework☆21Updated 4 years ago
- Malwarebytes Antivirus CVE☆8Updated 6 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- Kernel-mode file scanner☆17Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 5 years ago
- User-mode part of Zerokit platform☆20Updated 5 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 6 years ago
- PE Infector/Cryptor source code☆15Updated 7 years ago
- ☆13Updated 3 years ago
- ☆12Updated 3 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- Static library and headers for linking your software with ntdll.dll☆30Updated 4 years ago
- ☆19Updated 5 years ago
- Use to collect translations of the exp-db-papers☆9Updated 6 years ago
- Green shellcode challenge tools☆22Updated 5 years ago
- Easily hook WIN32 x64 functions☆17Updated last week