Keramas / WindowsKernelExploitsLinks
Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.
☆14Updated 5 years ago
Alternatives and similar repositories for WindowsKernelExploits
Users that are interested in WindowsKernelExploits are comparing it to the libraries listed below
Sorting:
- NT AUTHORITY\SYSTEM☆42Updated 5 years ago
 - "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
 - Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 2 months ago
 - Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
 - Antivirus Emulator Fingerprints☆30Updated 7 years ago
 - Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
 - Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
 - Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
 - This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
 - r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
 - Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
 - A small library helping to parse commandline parameters (for C/C++)☆58Updated 5 months ago
 - A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
 - ☆24Updated 6 years ago
 - ☆28Updated 6 years ago
 - Dumping credentials through windbg and pykd☆41Updated 2 years ago
 - A repository where I share my injection implemintations☆29Updated 5 years ago
 - Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
 - Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53Updated 5 years ago
 - ☆48Updated 5 years ago
 - CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
 - Another Portable Executable files analysing stuff☆21Updated 14 years ago
 - Rekall Memory Forensic Framework☆33Updated 6 years ago
 - A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
 - The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
 - The Multiplatform Linux Sandbox☆16Updated last year
 - A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
 - ☆16Updated 4 years ago
 - Fileless persistence, attacks and anti-forensic capabilties.☆94Updated 6 years ago
 - ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago