LuckyPi / PushPinLinks
☆97Updated 4 years ago
Alternatives and similar repositories for PushPin
Users that are interested in PushPin are comparing it to the libraries listed below
Sorting:
- Autonomous pre-boot DMA attack hardware implant for M.2 slot based on PicoEVB development board☆83Updated last year
- LeechCore - Physical Memory Acquisition Library & The LeechAgent Remote Memory Acquisition Agent☆635Updated last month
- Kernel shellcode injector☆143Updated 4 years ago
- Collect various versions of ntoskrnl files☆54Updated last year
- ☆153Updated 5 years ago
- ☆213Updated 2 weeks ago
- SMM rootkit similar to LoJax or MosaicRegressor☆126Updated last year
- Load your driver like win32k.sys☆255Updated 2 years ago
- Bypassing PatchGuard on modern x64 systems☆260Updated 2 years ago
- ☆209Updated 2 years ago
- Plugins related to LeechCore☆35Updated last week
- SMM UEFI module and client for UMD privilege escalation☆47Updated last month
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆244Updated 3 years ago
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆150Updated last year
- Browse Page Tables on Windows (Page Table Viewer)☆210Updated 3 years ago
- Exploit MsIo vulnerable driver☆107Updated 3 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆240Updated 3 years ago
- Hide codes/data in the kernel address space.☆190Updated 4 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆248Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆204Updated 4 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆300Updated 4 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆208Updated 2 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆145Updated 3 years ago
- Advanced driver monitoring utility.☆212Updated 2 years ago
- DSE bypass using a leaked cert and adjusting the current clock.☆151Updated 2 years ago
- ☆146Updated 4 years ago
- manual map unsigned driver over signed memory☆196Updated last year
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆166Updated 3 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆177Updated 7 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆117Updated 6 years ago