Meowoverflow / Rootkits_Subverting_the_Windows_KernelLinks
source code for the examples and topics from the book
☆10Updated 6 years ago
Alternatives and similar repositories for Rootkits_Subverting_the_Windows_Kernel
Users that are interested in Rootkits_Subverting_the_Windows_Kernel are comparing it to the libraries listed below
Sorting:
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆73Updated 3 years ago
- ☆14Updated 3 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- NT AUTHORITY\SYSTEM☆42Updated 5 years ago
- ☆164Updated 4 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆85Updated 5 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆18Updated 6 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- Windows kernel PDB data parsed into YAML☆41Updated last week
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 8 months ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Updated last year
- x86 and x64 assembly "read-eval-print loop" for Windows☆33Updated 8 years ago
- ☆90Updated 5 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆93Updated 3 years ago
- Windows Kernel Programming Experiments☆82Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- ☆72Updated 2 years ago
- ☆26Updated 3 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- A set of small utilities, helpers for PIN tracers☆34Updated last month
- ☆49Updated 5 years ago