ch3rn0byl / ANTfs
☆44Updated last year
Alternatives and similar repositories for ANTfs:
Users that are interested in ANTfs are comparing it to the libraries listed below
- call gates as stable comunication channel for NT x86 and Linux x86_64☆30Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆95Updated last year
- ☆29Updated last month
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆86Updated last year
- ☆29Updated last year
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Windows AppLocker Driver (appid.sys) LPE☆47Updated 5 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆35Updated last year
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- Windows internals and exploitation tricks☆93Updated last month
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 3 months ago
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆106Updated 2 years ago
- Proof-of-Concept for CVE-2024-26218☆49Updated 8 months ago
- Minifilter Callback Patching Proof-of-Concept☆64Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- ☆27Updated 2 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆22Updated 6 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 9 months ago
- A improved memory obfuscation primitive using a combination of special and 'normal' Asynchronous Procedural Calls☆105Updated 4 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- Finding Truth in the Shadows☆85Updated last year
- using the gpu to hide your payload☆53Updated 2 years ago
- Analysis of the vulnerability☆48Updated 11 months ago
- A more reliable way of resolving syscall numbers in Windows☆50Updated 11 months ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 2 years ago
- Native Powers Talk demos☆14Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆78Updated 2 years ago