Foolish1337 / kernel-programmingLinks
Progress of learning kernel development
☆14Updated 2 years ago
Alternatives and similar repositories for kernel-programming
Users that are interested in kernel-programming are comparing it to the libraries listed below
Sorting:
- ☆18Updated 6 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆19Updated 2 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 8 months ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- some sploits☆17Updated 9 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- ☆15Updated last year
- A collection of various exploits☆28Updated 9 months ago
- ☆13Updated 2 years ago
- BlackHat Asia 2025 code and presentations☆18Updated 3 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- ☆25Updated 5 months ago
- ☆12Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- ☆25Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- ☆28Updated 8 months ago
- ☆8Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- ☆54Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- really ?☆12Updated last year
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- Identifies metadata of .NET binary files.☆21Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 9 months ago