bigbang95 / ntoskrnl
Windows 常用版本内核文件收集
☆10Updated last year
Alternatives and similar repositories for ntoskrnl:
Users that are interested in ntoskrnl are comparing it to the libraries listed below
- 利用物理内存映射,实现虚拟内存的伪隐藏☆84Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆66Updated 2 years ago
- 大数字驱动逆向代码☆71Updated last year
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated 3 months ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆58Updated 2 years ago
- shellcode生成框架☆85Updated 8 months ago
- ☆30Updated last year
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆105Updated 2 years ago
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆121Updated last year
- Kill Protected Process Light Process (include av)☆56Updated last year
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆69Updated 3 years ago
- 收集常用windows版本内核文件☆32Updated last year
- Call NtCreateUserProcess directly as normal.☆68Updated 2 years ago
- An implementation of an indirect system call☆123Updated last year
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆19Updated this week
- bootkit驱动映射,三环进程注入加载指定模块☆12Updated 5 months ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago
- Enum and Remove Hook in Windows☆37Updated 3 months ago
- about how to make a anti-virus engine☆48Updated this week
- windwos内核研究与驱动Code☆62Updated 3 years ago
- Hide processes, files, services in Windows ring3☆25Updated 10 months ago
- Windows Defender VDM lua collections☆47Updated 2 years ago
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆17Updated 2 months ago
- ☆122Updated last year
- Load static-compiled PE from remote server.☆60Updated 3 years ago
- ☆18Updated 2 years ago
- Magical obfuscator, supports obfuscating EXE, BOF, and ShellCode.☆146Updated 4 months ago
- An easy-to-use and powerful Macro for Stack Spoofing.☆17Updated 2 months ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆112Updated last year