XShar / Windows_Kernel_Programming
Windows Kernel Programming (Обзорный перевод книги)
☆55Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Windows_Kernel_Programming
- Obfuscate calls to imports by patching in stubs☆64Updated 3 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆66Updated last year
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆53Updated 3 years ago
- Скрытие Win API☆26Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103Updated 4 years ago
- Rootkit & Anti-rootkit☆39Updated 9 months ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- ☆57Updated 2 years ago
- LSASS INJECTOR☆33Updated 5 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- Compact MBR Bootkit for Windows☆44Updated 2 years ago
- ☆44Updated 4 years ago
- Convert PE files to a shellcode☆73Updated 4 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆102Updated 3 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆56Updated 4 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- Binary rewriter for 64-bit PE files.☆43Updated 9 months ago
- Resolve DOS MZ executable symbols at runtime☆93Updated 3 years ago
- x64 syscall caller in C++.☆84Updated 6 years ago
- A simple program to obfuscate code written in cpp.☆46Updated 6 months ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆26Updated 3 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆36Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- ☆66Updated 3 years ago
- This is a simple driver with x64 inline assembly☆53Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆69Updated 3 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆44Updated 5 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆196Updated 4 years ago