NtRaiseHardError / Kaiser
Fileless persistence, attacks and anti-forensic capabilties.
☆87Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Kaiser
- Windows API Hashes used in the malwares☆40Updated 9 years ago
- PoC designed to evade userland-hooking anti-virus.☆85Updated 5 years ago
- A ready-made template for a project based on libpeconv.☆41Updated last month
- Assembly block for hooking windows API functions.☆81Updated 5 years ago
- Simple 32/64-bit PEs loader.☆136Updated 5 years ago
- Process Doppelgänging☆154Updated 6 years ago
- Sysmon shenanigans☆65Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Some simple process injection techniques targeting the Windows platform☆32Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103Updated 4 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆92Updated 5 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆103Updated 3 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 3 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆99Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆47Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆117Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆69Updated 3 years ago
- ☆67Updated last year
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆66Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆92Updated 2 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 8 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆110Updated 3 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Shellcode to load an appended Dll☆89Updated 4 years ago
- Process reimaging proof of concept code☆95Updated 5 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 2 months ago