LuckyPi / PushPinLinks
☆99Updated 4 years ago
Alternatives and similar repositories for PushPin
Users that are interested in PushPin are comparing it to the libraries listed below
Sorting:
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆86Updated last year
- Plugins related to LeechCore☆38Updated last month
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆395Updated 3 years ago
- LeechCore - Physical Memory Acquisition Library & The LeechAgent Remote Memory Acquisition Agent☆647Updated last month
- Advanced driver monitoring utility.☆213Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆248Updated 2 years ago
- SMM rootkit similar to LoJax or MosaicRegressor☆130Updated last year
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆295Updated 9 months ago
- Kernel shellcode injector☆143Updated 4 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆241Updated 4 years ago
- Load your driver like win32k.sys☆255Updated 2 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆212Updated 3 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆156Updated 3 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆206Updated 4 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆250Updated 3 years ago
- Bypassing PatchGuard on modern x64 systems☆262Updated 2 years ago
- Exploit MsIo vulnerable driver☆110Updated 3 years ago
- ☆153Updated 5 years ago
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆326Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆125Updated 2 years ago
- My Proof of Concept code for different publicly disclosed vulnerabilities☆47Updated last year
- Run Processes as PPL with ELAM☆164Updated 3 years ago
- Various Process Injection Techniques☆151Updated 3 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆174Updated 2 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆178Updated 7 years ago
- DSE bypass using a leaked cert and adjusting the current clock.☆152Updated 2 years ago
- Exploitable drivers, you know what I mean☆150Updated last year
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆80Updated 4 years ago
- APC Internals Research Code☆166Updated 5 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆281Updated 4 years ago