K2 / ADMMutateLinks
Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia.edu/sites/default/files/ccs07poly.pdf :) If I ever port this to 64 or implement a few other suggestions (sorry I lost ppc code version contributed) it will be orders of magnitude more difficult to spot, so I…
☆91Updated 2 years ago
Alternatives and similar repositories for ADMMutate
Users that are interested in ADMMutate are comparing it to the libraries listed below
Sorting:
- kernel exploitation helper class☆77Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 13 years ago
- A Python tool to generate ROP chains☆64Updated 8 months ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- ☆115Updated 9 years ago
- Exploiting MS15-061 local Privilege escalation☆49Updated 10 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- C++-based shellcode builder☆115Updated 4 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Updated 9 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- ☆36Updated 8 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆124Updated 6 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Updated 10 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- ☆53Updated 8 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆169Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32Updated 10 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Translate regular Assembly into Extended Instructions☆88Updated 12 years ago
- KINS Banking Trojan☆63Updated 10 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆90Updated last month
- Bootkits Revisited☆40Updated 11 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago