ch3rn0byl / CharonLinks
A UEFI extraction tool
☆18Updated 8 months ago
Alternatives and similar repositories for Charon
Users that are interested in Charon are comparing it to the libraries listed below
Sorting:
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- allowing um r/w through km from um ioctl ™☆11Updated 3 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆30Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- UEFI bootkit: Hardware Implant. In-Progress☆15Updated 3 years ago
- ☆14Updated last year
- ☆59Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- ☆16Updated 2 years ago
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆64Updated 2 years ago
- ☆25Updated 2 years ago
- kASLR bypass technique on Intel CPUs.☆21Updated 2 months ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Code Integrity Violation Spotter☆16Updated last year
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆10Updated 3 years ago
- ☆29Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago
- ☆18Updated 4 years ago
- ☆21Updated 4 years ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆40Updated last month
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆22Updated last year
- Lightweight Threat Detection System - (Base)☆15Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆34Updated 3 years ago
- Windows PDB Parser using Imagehlp library.☆16Updated 2 years ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago