d35ha / xKeLogger
Kernel mode windows NT API logger
☆21Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for xKeLogger
- Reflective DLL Injection style process infector☆19Updated 6 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Execute an arbitrary command within the context of another process☆19Updated 5 years ago
- ☆16Updated 4 years ago
- User-mode part of Zerokit platform☆20Updated 5 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- Common Malware Techniques☆13Updated last year
- Simple PE packer with RtlCompressBuffer☆21Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆29Updated 5 years ago
- Self-Loading Registration Free COM Functions☆11Updated 4 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆18Updated 8 years ago
- Code injection via delay load libraries☆34Updated 7 years ago
- Example for PagedOut!☆24Updated 5 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆19Updated 7 years ago
- ☆33Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆26Updated 7 years ago
- hooking KiUserApcDispatcher☆22Updated 7 years ago
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago