Driver Reverse & Exploitation
☆82Sep 4, 2025Updated 7 months ago
Alternatives and similar repositories for BYOVD-DriverKiller
Users that are interested in BYOVD-DriverKiller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆62Apr 13, 2025Updated last year
- A tool that bypasses Windows Defender by manually loading DLLs, parsing EAT directly, and updating IAT with unhooked functions to run M…☆21Jul 14, 2024Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 7 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆99Apr 2, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆26Aug 11, 2025Updated 8 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆17Oct 25, 2024Updated last year
- A Reflective Loader for macOS☆148Jul 20, 2025Updated 8 months ago
- Windows Active DIrectory Pentesting documentation.☆20Jun 14, 2024Updated last year
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆232Nov 6, 2025Updated 5 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆286Apr 6, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆411Dec 8, 2024Updated last year
- Generate Proxy DLLs in Rust☆50Mar 2, 2026Updated last month
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆130Nov 17, 2025Updated 5 months ago
- "Service-less" driver loading☆185Nov 28, 2024Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆80Jul 25, 2025Updated 8 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆94Jan 2, 2026Updated 3 months ago
- ☆16Jun 15, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆45Dec 7, 2024Updated last year
- ☆78Aug 1, 2023Updated 2 years ago
- the bear is an infostealer (grabber) malware written in C and assembly with the focus on evading detection.☆16Sep 8, 2024Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆93Apr 1, 2026Updated 2 weeks ago
- easy dll proxying in go☆14Apr 24, 2022Updated 3 years ago
- ☆40Nov 25, 2025Updated 4 months ago
- Exploits written while preparing for the OSED exam☆24Apr 30, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- UAC Bypass using UIAccess program QuickAssist☆231Nov 30, 2025Updated 4 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 9 months ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 3 years ago
- 无痕注入1☆11Jun 1, 2021Updated 4 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Feb 11, 2024Updated 2 years ago
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆44Jan 9, 2025Updated last year
- A C/C++ framework designed to simplify shellcode creation on any compilers and platforms using C. Supports Windows & Linux, and practical…☆21Sep 16, 2024Updated last year