Leaking kernel addresses from ETW consumers. Requires Administrator privileges.
☆92Nov 6, 2025Updated 4 months ago
Alternatives and similar repositories for EtwLeakKernel
Users that are interested in EtwLeakKernel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A different approach to writing BOFs in rust.☆20Aug 20, 2025Updated 7 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆155Nov 23, 2025Updated 4 months ago
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 4 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆117Oct 30, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆38Nov 11, 2025Updated 4 months ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 4 months ago
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆129Jan 31, 2026Updated last month
- ☆27Nov 24, 2024Updated last year
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆214Aug 21, 2025Updated 7 months ago
- Three different shellcode techniques on the Windows Kernel☆15Apr 8, 2025Updated 11 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆441Dec 7, 2025Updated 3 months ago
- ☆12Feb 4, 2025Updated last year
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆23Aug 18, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass☆169Sep 22, 2025Updated 6 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆46Apr 14, 2024Updated last year
- ☆59Dec 10, 2025Updated 3 months ago
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆55Mar 4, 2026Updated 3 weeks ago
- ☆46Sep 22, 2025Updated 6 months ago
- PoC for generating bthprops.cpl module designed to be loaded by Fsquirt.exe LOLBin☆122Jan 4, 2026Updated 2 months ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆33Oct 22, 2024Updated last year
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- ☆34Apr 14, 2025Updated 11 months ago
- Generate a PDB file given the old PDB file and an address mapping☆53Aug 3, 2025Updated 7 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- Exploitable drivers, you know what I mean☆152Nov 16, 2025Updated 4 months ago
- ☆92Aug 16, 2025Updated 7 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆54Nov 3, 2025Updated 4 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆67Dec 15, 2025Updated 3 months ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088☆55Aug 18, 2025Updated 7 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆139Apr 6, 2025Updated 11 months ago
- .data ptr swapper for newer win32k versions. (Supports Windows 11)☆38Jan 19, 2026Updated 2 months ago
- Unix-inspired shell and RAM filesystem for the Commodore 64 (6502 assembly) / AI-assisted development☆23Feb 27, 2026Updated last month