FuzzySecurity / Driver-Template
Bare template for a Kernel Mode Driver
☆51Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Driver-Template
- ☆36Updated 2 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- C++ function that will automagically unhook a specified Windows API☆60Updated 4 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆89Updated 5 years ago
- Sysmon shenanigans☆65Updated 4 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆39Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆42Updated 3 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆71Updated 4 years ago
- Simple Process Hollowing in C#☆67Updated 7 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆59Updated this week
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 4 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆92Updated 5 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆62Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆73Updated 4 years ago
- ☆35Updated 5 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆42Updated last month
- ☆49Updated 4 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆83Updated 4 years ago
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆58Updated 2 years ago
- Process reimaging proof of concept code☆95Updated 5 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- ☆41Updated 5 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆113Updated 5 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆44Updated 7 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆33Updated 3 years ago