eclypsium / Screwed-Drivers
"Screwed Drivers" centralized information source for code references, links, etc.
☆353Updated 5 years ago
Alternatives and similar repositories for Screwed-Drivers:
Users that are interested in Screwed-Drivers are comparing it to the libraries listed below
- Extract Windows Defender database from vdm files and unpack it☆438Updated 5 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆395Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆720Updated 3 weeks ago
- Quickly debug shellcode extracted during malware analysis☆596Updated last year
- A more stealthy variant of "DLL hollowing"☆342Updated last year
- Examples of leaking Kernel Mode information from User Mode on Windows☆597Updated 7 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆557Updated 2 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆600Updated 2 years ago
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆317Updated last year
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆203Updated 2 years ago
- Obfuscate specific windows apis with different apis☆999Updated 4 years ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆367Updated 2 years ago
- Windows NT x64 syscall fuzzer☆601Updated last year
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆197Updated 2 months ago
- Tools for instrumenting Windows Defender's mpengine.dll☆294Updated 6 years ago
- ☆809Updated 5 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆697Updated 4 years ago
- Expriments☆452Updated 6 months ago
- My notes while studying Windows internals☆423Updated 4 months ago
- A memory scanning evasion technique☆864Updated 7 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆862Updated 5 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆351Updated 5 months ago
- Research on Windows Kernel Executive Callback Objects☆286Updated 5 years ago
- ☆394Updated 8 years ago
- A small bootkit which does not rely on x64 assembly.☆477Updated 5 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆587Updated 2 months ago
- A DTrace on Windows Reimplementation☆343Updated 2 months ago
- Internals information about Hyper-V☆689Updated 3 months ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆539Updated last year
- Universal Unhooking☆320Updated 6 years ago