Keramas / WindowsKernelExploitsLinks
Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.
☆14Updated 5 years ago
Alternatives and similar repositories for WindowsKernelExploits
Users that are interested in WindowsKernelExploits are comparing it to the libraries listed below
Sorting:
- Antivirus Emulator Fingerprints☆30Updated 7 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 5 months ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- ☆28Updated 6 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 7 months ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- ☆23Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 7 years ago
- ☆48Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- ☆16Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆28Updated 8 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 6 years ago
- ☆33Updated 6 years ago
- Ring3 Rootkit Backdoor.☆43Updated 10 years ago
- medium-rare☆28Updated 6 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago