SpookySec / GHRLLinks
Game Hacking Ruby Lib
☆24Updated 4 years ago
Alternatives and similar repositories for GHRL
Users that are interested in GHRL are comparing it to the libraries listed below
Sorting:
- simple user-mode Rootkit☆107Updated 3 years ago
- Scan for potentially vulnerable drivers☆94Updated 3 years ago
- A journal for $6,000 Riot Vanguard bounty.☆67Updated 2 years ago
- Easy XOR string encryption for NET based binaries☆140Updated 2 years ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆42Updated last year
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆26Updated 9 months ago
- PoC for popping a system shell against the LnvMSRIO.sys driver☆117Updated 3 months ago
- Simple x86 Trampoline Hook☆43Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- Simple API Hooks detector☆76Updated 3 years ago
- Exploitable drivers, you know what I mean☆154Updated last month
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆156Updated 2 years ago
- A simple Windows kernel rootkit.☆96Updated 7 months ago
- ☆72Updated 2 years ago
- Native Shellcode Injector Via Handle Hijacking & Pool Party.☆13Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆95Updated last year
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Updated 3 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆111Updated last year
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆50Updated last month
- Abusing exceptions for code execution.☆113Updated 2 years ago
- ☆116Updated 3 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Updated 2 years ago
- spoof return address☆79Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Updated 4 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆139Updated 2 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- using the gpu to hide your payload☆63Updated 3 years ago