Hagrid29 / BYOVDKit
bring your own vulnerable driver
☆91Updated last year
Alternatives and similar repositories for BYOVDKit:
Users that are interested in BYOVDKit are comparing it to the libraries listed below
- ☆47Updated 2 years ago
- TypeLib persistence technique☆108Updated 4 months ago
- The code is a pingback to the Dark Vortex blog:☆174Updated 2 years ago
- ☆112Updated 2 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆132Updated 2 years ago
- Load static-compiled PE from remote server.☆59Updated 3 years ago
- It stinks☆101Updated 2 years ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆128Updated 7 months ago
- ☆98Updated last year
- ☆134Updated last year
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- Bypass LSA protection using the BYODLL technique☆155Updated 5 months ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆115Updated 2 years ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆96Updated last year
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆83Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆78Updated last year
- ☆61Updated 9 months ago
- Patch AMSI and ETW in remote process via direct syscall☆81Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆71Updated 3 years ago
- An implementation of an indirect system call☆120Updated last year
- A basic C2 framework written in C☆59Updated 8 months ago
- Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.☆46Updated last year
- Exploitation of echo_driver.sys☆169Updated last year
- I have documented all of the AMSI patches that I learned till now☆74Updated last year
- ☆78Updated last year
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆57Updated 2 months ago
- Load a dynamic library from memory by modifying the native Windows loader☆207Updated last month
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆109Updated 7 months ago
- CreateRemoteThread: how to pass multiple parameters to the remote thread function without shellcode.☆131Updated last year