MrAle98 / ATDCM64a-LPELinks
☆20Updated 6 months ago
Alternatives and similar repositories for ATDCM64a-LPE
Users that are interested in ATDCM64a-LPE are comparing it to the libraries listed below
Sorting:
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆28Updated 2 months ago
- A PoC tool for exploiting leaked process and thread handles☆32Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆25Updated last month
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆39Updated last month
- POC for CVE-2023-29360☆12Updated 10 months ago
- doesnt work and wont work on it anymore☆9Updated last year
- ☆31Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆19Updated last year
- A few examples of how to trap virtual memory access on Windows.☆31Updated 6 months ago
- A C/C++/Asm template for PIC malware☆10Updated 9 months ago
- ☆61Updated last year
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- Vulnerability analysis and proof of concepts☆34Updated 2 years ago
- Released presentations of my talks + code that used during these talks☆14Updated 10 months ago
- ☆26Updated 3 years ago
- LPE of CVE-2024-26230☆24Updated 10 months ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆31Updated 3 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- In-memory hiding technique☆55Updated 6 months ago
- ☆22Updated last year
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆26Updated last year
- ☆40Updated 4 months ago
- ☆62Updated 3 years ago
- ☆39Updated 2 years ago
- Intel 64/Windows low-level experiments☆37Updated last week
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year