LuckyPi / PushPin
☆85Updated 4 years ago
Alternatives and similar repositories for PushPin:
Users that are interested in PushPin are comparing it to the libraries listed below
- Plugins related to LeechCore☆35Updated last week
- ☆153Updated 5 years ago
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆75Updated last year
- Load your driver like win32k.sys☆251Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆203Updated 3 years ago
- Exploit MsIo vulnerable driver☆95Updated 3 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆143Updated 3 years ago
- Bypassing PatchGuard on modern x64 systems☆255Updated last year
- Hooking SSDT with Avast Internet Security Hypervisor☆116Updated 5 years ago
- Kernel shellcode injector☆143Updated 4 years ago
- My Proof of Concept code for different publicly disclosed vulnerabilities☆47Updated 10 months ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆238Updated 3 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆255Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆232Updated 3 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆172Updated 7 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆294Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- PoC HWID spoofer that runs in EFI☆301Updated 3 months ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆366Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆97Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆110Updated 4 years ago
- A library to read physical memory and system-wide virtual memory.☆125Updated 6 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆203Updated 2 years ago
- ☆152Updated 10 months ago
- Advanced driver monitoring utility.☆207Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆264Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆307Updated 2 years ago
- SMM rootkit similar to LoJax or MosaicRegressor☆112Updated last year
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆149Updated 2 years ago