vdk is a set of utilities used to help with exploitation of a vulnerable driver.
☆46May 22, 2022Updated 3 years ago
Alternatives and similar repositories for vdk
Users that are interested in vdk are comparing it to the libraries listed below
Sorting:
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆21Jan 1, 2025Updated last year
- A simple process query/manipulation tool using driver hooked system call. (2019)☆12Aug 30, 2021Updated 4 years ago
- A x86_64 software emulator☆162Aug 25, 2025Updated 6 months ago
- Fixes the "Device\Nal is already in use" error on kdmapper.☆19Jan 9, 2023Updated 3 years ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixer☆20Dec 29, 2021Updated 4 years ago
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- Escape From Tarkov ESP texture and Grass/Visor Remover☆10Jan 27, 2021Updated 5 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- A debugger library using VEH.☆68Sep 3, 2024Updated last year
- neat way to detect memory read using nt layer function.☆14Aug 4, 2023Updated 2 years ago
- VTable dumper for IDA 7.7+☆18Jun 19, 2025Updated 8 months ago
- ☆15Mar 13, 2023Updated 2 years ago
- Windows Kernel nt files - To research windows kernel☆15Jul 23, 2020Updated 5 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- Only for Stress-Testing☆26Apr 9, 2022Updated 3 years ago
- poc code for CVE-2024-38080☆30Sep 1, 2024Updated last year
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Resolve DOS MZ executable symbols at runtime☆96Nov 12, 2021Updated 4 years ago
- Yet Another SetWindowsHookExW Injector☆17Nov 3, 2019Updated 6 years ago
- ☆40Mar 23, 2023Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- Way more secure than client side auth☆27May 13, 2022Updated 3 years ago
- Simple tool to dump/hide services in services.exe process.☆14Apr 22, 2022Updated 3 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆57May 23, 2022Updated 3 years ago
- A collection of Anti-RE & Anti-Dump methods☆28Jan 5, 2021Updated 5 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- ☆22Oct 18, 2023Updated 2 years ago
- ☆18Dec 4, 2020Updated 5 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- ☆16Mar 1, 2019Updated 6 years ago