Progress of learning kernel development
☆14Nov 20, 2022Updated 3 years ago
Alternatives and similar repositories for kernel-programming
Users that are interested in kernel-programming are comparing it to the libraries listed below
Sorting:
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 2 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Solution for the Optimizoor club's sqrt challenge☆18Nov 2, 2022Updated 3 years ago
- Triton based symbolic emulator☆16Oct 30, 2022Updated 3 years ago
- ☆20Mar 21, 2024Updated last year
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- This is Command and Control (C2) Framework (cli / c2-server / implant)☆19Sep 2, 2024Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Aug 21, 2024Updated last year
- ☆27Feb 13, 2026Updated 2 weeks ago
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- Hotkey-based keylogger for Windows☆32Oct 17, 2024Updated last year
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 5 years ago
- Android Shared Object Injector☆34Jan 7, 2021Updated 5 years ago
- ☆24Sep 13, 2022Updated 3 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- ☆127Feb 9, 2026Updated 2 weeks ago
- ☆35Oct 18, 2022Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- LPE exploit for a UAF in Windows (CVE-2021-40449).☆45Nov 5, 2021Updated 4 years ago
- CVE-2020–14882 by Jang☆29Oct 29, 2020Updated 5 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- My research WIP bluepill hypervisor☆40Mar 15, 2023Updated 2 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- A Type-1 hypervisor aimed to implement kernel hotswapping☆30Feb 8, 2024Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆82Oct 19, 2023Updated 2 years ago