ajkhoury / RemoteCode-KernelLinks
Simple code generation library developed in C intended for code generation in Kernel mode
☆17Updated 2 years ago
Alternatives and similar repositories for RemoteCode-Kernel
Users that are interested in RemoteCode-Kernel are comparing it to the libraries listed below
Sorting:
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Updated 14 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- A command line tool to load and unload a device driver.☆47Updated 8 years ago
- My take on the capcom driver vulnerability☆28Updated 7 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆47Updated 10 years ago
- A sample on how to inject a DLL from a kernel driver☆62Updated 8 years ago
- Analyze PatchGuard☆59Updated 6 years ago
- Hiding x32/x64 Modules/DLLs using PEB☆61Updated 10 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆33Updated 7 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆84Updated 14 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Manual PE image mapper☆65Updated 11 years ago
- MIR-Engine☆24Updated 8 years ago
- Wow64 syscall hook☆41Updated 8 years ago
- Polymorphic Stub Creator☆34Updated 8 years ago
- Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!☆33Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 9 years ago
- Windows handle stealing POC with NtDuplicateObject☆40Updated 8 years ago
- Simple header only library to change return address on current stack frame.☆24Updated 8 years ago
- LoadLibrary, GetModuleHandle and GetProcAddress calls for remote processes☆22Updated 10 years ago
- Anti-Anti-VM solution via Windows Driver☆58Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆58Updated 5 years ago