Flerov / EAKC-EnumAllKernelCallbacks
Enumerate Callbacks and all Object Types
☆13Updated 2 years ago
Alternatives and similar repositories for EAKC-EnumAllKernelCallbacks
Users that are interested in EAKC-EnumAllKernelCallbacks are comparing it to the libraries listed below
Sorting:
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- A VMWare logger using built-in backdoor.☆29Updated 7 months ago
- ☆39Updated last year
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆31Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 8 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆53Updated 2 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆87Updated last month
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆62Updated last month
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated 2 years ago
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆28Updated 2 weeks ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆111Updated 2 years ago
- ☆26Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆16Updated 3 years ago
- ☆38Updated 2 months ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- ☆10Updated 3 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 11 months ago
- Finding Truth in the Shadows☆92Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆76Updated 2 weeks ago
- An attempt at reversing WindowsDefender☆20Updated 7 months ago
- A PoC tool for exploiting leaked process and thread handles☆31Updated last year
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆30Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 11 months ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆85Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 9 months ago