Sh3lldon / Vulnerable-WinKern-DriversLinks
Here you can find some vulnerable Windows Kernel Drivers
☆13Updated 7 months ago
Alternatives and similar repositories for Vulnerable-WinKern-Drivers
Users that are interested in Vulnerable-WinKern-Drivers are comparing it to the libraries listed below
Sorting:
- kernel to user mode APC injector☆45Updated 3 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- collection of code snippets,windbg,python scripts and resources☆14Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated 11 months ago
- Listing UDP connections with remote address without sniffing.☆28Updated 2 years ago
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆31Updated 3 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Updated 4 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆30Updated last year
- silence file system monitoring components by hooking their minifilters☆59Updated last year
- windows rootkit☆61Updated last year
- Executes Read/Write process memory with `NtQueryCompositionSurfaceStatistics`☆18Updated last year
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated last year
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆66Updated 2 years ago
- 2022 Updated Kernelmode-Code☆33Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆16Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆72Updated 5 months ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆22Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆31Updated 3 years ago
- Lightweight Threat Detection System - (Base)☆15Updated last year
- Experiment to use sections as User/Kernelmode comm vector☆22Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆42Updated 3 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago