DownWithUp / KLoad_C
A simple command line utility to quickly load and unload Windows drivers
☆17Updated 2 years ago
Alternatives and similar repositories for KLoad_C:
Users that are interested in KLoad_C are comparing it to the libraries listed below
- ☆45Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year
- Sample project for kernel debugging automation with Vagrant☆60Updated 4 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 4 years ago
- SigMaker plugin for Binary Ninja☆9Updated 4 years ago
- Open Course for diving security internal☆51Updated 5 years ago
- This is a simple driver with x64 inline assembly☆54Updated 4 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆71Updated 5 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆39Updated 2 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆76Updated 8 months ago
- clone of armadillo patched for windows☆47Updated 5 months ago
- Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection…☆15Updated 3 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆97Updated 4 years ago
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- Abusing exceptions for code execution.☆109Updated 2 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆58Updated 8 months ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- AMD SVM hypervisor rootkit proof of concept☆45Updated last year
- Resolve DOS MZ executable symbols at runtime☆97Updated 3 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆55Updated 4 years ago
- A set of small utilities, helpers for PIN tracers☆31Updated last year
- ☆59Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated 2 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago