Keramas / WindowsKernelExploitsLinks
Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.
☆14Updated 5 years ago
Alternatives and similar repositories for WindowsKernelExploits
Users that are interested in WindowsKernelExploits are comparing it to the libraries listed below
Sorting:
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- Antivirus Emulator Fingerprints☆30Updated 7 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- ☆48Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 5 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 8 months ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- ☆16Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆21Updated 5 years ago
- ☆31Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 6 years ago
- ☆12Updated 6 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago