r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
☆28Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for r0ak
Users that are interested in r0ak are comparing it to the libraries listed below
Sorting:
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- Static library and headers for linking your software with ntdll.dll☆37Dec 16, 2019Updated 6 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆12Nov 27, 2025Updated 3 months ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- Tools used by many projects☆16Updated this week
- A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with c…☆20Mar 11, 2023Updated 2 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆54Sep 13, 2021Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- ☆13Apr 6, 2016Updated 9 years ago
- IDA plugin for UEFI firmware analysis and reverse engineering automation☆14May 14, 2022Updated 3 years ago
- A document tagging library☆33Mar 27, 2025Updated 11 months ago
- Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right a…☆33May 21, 2019Updated 6 years ago
- Tools for signing Windows files☆15Updated this week
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Botnet created in p2p architecture.☆11May 17, 2018Updated 7 years ago
- A collection of crackmes☆41Jan 20, 2025Updated last year
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Feb 12, 2026Updated 2 weeks ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆22Sep 4, 2023Updated 2 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Nov 20, 2019Updated 6 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- Автор Зорков Игорь.☆18May 6, 2019Updated 6 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Jan 24, 2011Updated 15 years ago
- The Win32 Anti-Intrusion Library☆213May 30, 2019Updated 6 years ago
- PEI stage backdoor for UEFI compatible firmware☆228May 1, 2021Updated 4 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago