An example of how x64 kernel shellcode can dynamically find and use APIs
☆104May 14, 2020Updated 5 years ago
Alternatives and similar repositories for DynamicKernelShellcode
Users that are interested in DynamicKernelShellcode are comparing it to the libraries listed below
Sorting:
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆243Jul 7, 2021Updated 4 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Jan 21, 2025Updated last year
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆240Nov 6, 2019Updated 6 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- ☆125May 23, 2020Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆65Jun 19, 2019Updated 6 years ago
- Research on Windows Kernel Executive Callback Objects☆315Feb 22, 2020Updated 6 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆117May 26, 2020Updated 5 years ago
- ☆17Feb 29, 2020Updated 5 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 3 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- C++ 17 compile time string encryption supporting vs2010-2019☆76Jun 25, 2020Updated 5 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- View handles and object for each object type☆64Sep 1, 2019Updated 6 years ago
- A sample on how to inject a DLL from a kernel driver☆61Sep 13, 2016Updated 9 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆74Oct 28, 2019Updated 6 years ago
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago
- Microsoft Edge Microsoft Edge主页算法☆20Apr 15, 2019Updated 6 years ago