Sentinel-One / SKREAM
SentinelOne's KeRnel Exploits Advanced Mitigations
☆53Updated 6 years ago
Alternatives and similar repositories for SKREAM:
Users that are interested in SKREAM are comparing it to the libraries listed below
- ☆34Updated 3 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- A fast execution trace symbolizer for Windows.☆130Updated last year
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 10 months ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 5 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆73Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- ☆109Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆65Updated 5 years ago
- Elevation of privilege detector based on HyperPlatform☆120Updated 8 years ago
- Enumerate user mode shared memory mappings on Windows.☆121Updated 4 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 5 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆123Updated 6 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- Hyper-V Research is trendy now☆178Updated last year
- A simple API monitor for Windbg☆63Updated 8 years ago
- kernel pool windbg extension☆82Updated 9 years ago
- clone of armadillo patched for windows☆47Updated 6 months ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- ☆19Updated 2 weeks ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆48Updated 4 years ago
- Simple library to spray the Windows Kernel Pool☆109Updated 5 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆140Updated 6 years ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- A branch-monitor-based solution for process monitoring.☆133Updated 5 years ago