NullArray / WinKernel-Resources
A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level security.
☆116Updated last year
Related projects: ⓘ
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆150Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆229Updated 2 years ago
- Advanced driver monitoring utility.☆194Updated 2 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆216Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆251Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆221Updated 2 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆114Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆151Updated last month
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆168Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆50Updated 4 months ago
- Abusing exceptions for code execution.☆104Updated last year
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆260Updated last year
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆214Updated 2 months ago
- x86 PE Mutator☆211Updated last year
- PoC Anti-Rootkit to uncover Windows Drivers/Rootkits mapped to Kernel Memory.☆138Updated this week
- Admin to Kernel code execution using the KSecDD driver☆232Updated 5 months ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆195Updated 3 years ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆101Updated 2 weeks ago
- The best theme for x64dbg!☆78Updated 2 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆101Updated 3 weeks ago
- Exploitable drivers, you know what I mean☆124Updated 5 months ago
- Kernel driver for detecting Intel VT-x hypervisors.☆167Updated last year
- The Windbg extension that implements commands helpful to study Hyper-V on Intel processors.☆124Updated 3 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆100Updated last year
- APC Internals Research Code☆155Updated 4 years ago
- Loading dbk64.sys and grabbing a handle to it☆148Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆88Updated 3 years ago
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆81Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆161Updated 8 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆74Updated last year