Operating System Design Review: A systematic analysis of modern systems architecture
☆338Jan 11, 2026Updated last month
Alternatives and similar repositories for operating-system-design-review
Users that are interested in operating-system-design-review are comparing it to the libraries listed below
Sorting:
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Hardcore Debugging☆933Jan 6, 2026Updated last month
- For when DLLMain is the only way☆424Oct 29, 2024Updated last year
- Reverse engineering winapi function loadlibrary.☆233Apr 17, 2023Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆100Jan 3, 2026Updated 2 months ago
- Perfect DLL Proxying using forwards with absolute paths.☆340Nov 3, 2025Updated 4 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆324Jan 17, 2024Updated 2 years ago
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆289May 27, 2024Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆590Aug 2, 2025Updated 7 months ago
- PoCs for Kernelmode rootkit techniques research.☆432Nov 4, 2025Updated 4 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Feb 11, 2024Updated 2 years ago
- Evasion by machine code de-optimization.☆418Jul 22, 2024Updated last year
- Sleep obfuscation☆268Dec 13, 2024Updated last year
- ☆147Oct 29, 2024Updated last year
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆411Jan 11, 2026Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Reflective DLL Injection Made Bella☆249Jan 6, 2025Updated last year
- Tools for analyzing EDR agents☆277Jun 10, 2024Updated last year
- ☆334Sep 21, 2025Updated 5 months ago
- Generic PE loader for fast prototyping evasion techniques☆244Jul 2, 2024Updated last year
- Inject DLLs into the explorer process using icons☆408May 18, 2025Updated 9 months ago
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆297Dec 10, 2025Updated 2 months ago
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆108Apr 18, 2024Updated last year
- The Definitive Guide To Process Cloning on Windows☆543Jan 3, 2024Updated 2 years ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆286Jan 21, 2024Updated 2 years ago
- ☆60Jan 9, 2023Updated 3 years ago
- ☆181Apr 24, 2025Updated 10 months ago
- PE (and elf now!) bin2bin obfuscator☆820Oct 11, 2025Updated 4 months ago
- ☆108Aug 21, 2024Updated last year
- A BOF that runs unmanaged PEs inline☆681Oct 23, 2024Updated last year
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,248Dec 11, 2023Updated 2 years ago
- early cascade injection PoC based on Outflanks blog post, in rust☆62Nov 8, 2024Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆590Jan 5, 2025Updated last year
- Tools and PoCs for Windows syscall investigation.☆367Dec 2, 2025Updated 3 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆360Aug 11, 2024Updated last year
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated last year