aashishpanthi / search-engineLinks
This is an open source search engine built using redis and puppeteer
β11Updated 3 years ago
Alternatives and similar repositories for search-engine
Users that are interested in search-engine are comparing it to the libraries listed below
Sorting:
- Activate Windows & Office πβ13Updated last year
- source code for the examples and topics from the bookβ10Updated 6 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineeringβ15Updated 4 years ago
- Hooking Heavens Gate in a weekendβ13Updated 4 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if needeβ¦β27Updated 2 years ago
- β16Updated 3 years ago
- β25Updated 4 years ago
- Experiment to use sections as User/Kernelmode comm vectorβ22Updated 2 years ago
- Bypassing kernel patch protection runtimeβ21Updated 2 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell βdbutil_2_3.sysβ Kernel Exploitβ24Updated 4 years ago
- β12Updated last year
- x86_64, PE32+, FAT32 bootloaderβ27Updated 4 years ago
- β59Updated 3 years ago
- x64 injector using LoadLibrary made in assembler (MASM)β27Updated 7 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.β19Updated 7 months ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVMβ27Updated 2 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signaturesβ38Updated last year
- My research WIP bluepill hypervisorβ40Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.β91Updated 4 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.β11Updated 7 years ago
- XOrCryptEx lightweight C Utility/Algorithmβ11Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical addressβ23Updated 4 years ago
- A driver to implement IOCTL hookingβ27Updated 3 years ago
- Fake Timestamps of Driver Certificates while keeping validity.β18Updated 4 years ago
- UEFI bootkit: Hardware Implant. In-Progressβ15Updated 3 years ago
- RWX Section Abusingβ16Updated 2 years ago
- Extended library for using direct system calls on windowsβ17Updated 4 years ago
- A thin introspection hypervisor framework that allows for low level resource manipulation.β12Updated 2 years ago
- x64 Windows privilege elevation using anycallβ22Updated 4 years ago
- An example code of CiGetCertPublisherNameβ17Updated 3 years ago