RITRedteam / goofkit
In line function hooking LKM rootkit
☆51Updated 4 years ago
Alternatives and similar repositories for goofkit:
Users that are interested in goofkit are comparing it to the libraries listed below
- ☆48Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆97Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆68Updated 2 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- ☆27Updated 5 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Process reimaging proof of concept code☆95Updated 5 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆110Updated 4 years ago
- Go Lang Portable Executable Parser☆39Updated 3 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆48Updated 4 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- ☆46Updated 2 years ago
- ☆22Updated 4 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆39Updated 5 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Simple 32/64-bit PEs loader.☆137Updated 6 years ago
- Sysmon shenanigans☆65Updated 4 years ago
- Proxy system calls over an RPC channel☆97Updated 3 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- ☆157Updated 3 years ago