Rhydon1337 / windows-kernel-file-delete
Force a file delete using a windows kernel driver
☆61Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for windows-kernel-file-delete
- ☆125Updated last year
- Protect a file from being deleted using windows kernel file system minifilter driver☆35Updated 3 years ago
- windows kernel pagehook☆38Updated 2 years ago
- Protect a process from code injection, termination and hooking☆38Updated 3 years ago
- Windows PDB parser for kernel-mode environment.☆90Updated last year
- DSE & PG bypass via BYOVD attack☆37Updated 7 months ago
- Hook NtDeviceIoControlFile with PatchGuard☆101Updated 2 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆82Updated last year
- ☆69Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆106Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated last year
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆46Updated last year
- 收集常用windows版本内核文件☆31Updated last year
- Reverse engineering winapi function loadlibrary.☆70Updated last year
- ☆32Updated last year
- A library to assist with memory & code protection.☆53Updated 8 months ago
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- ☆118Updated last year
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆52Updated 2 years ago
- ☆25Updated 3 years ago
- silence file system monitoring components by hooking their minifilters☆51Updated 9 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆83Updated last year
- Debug Print viewer (user and kernel)☆63Updated 9 months ago
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆67Updated 3 weeks ago
- Dynamically generated obfuscated jumps and/or function calls☆33Updated last year
- Example of reading process memory through kernel special APC☆98Updated last year
- A poc that abuses Enclave☆36Updated 2 years ago
- bootkit驱动映射,三环进程注入加载指定模块☆11Updated last month
- ☆63Updated 6 years ago
- A method to Disable DSE using .data ptr hooks☆26Updated 9 months ago