ghostbyt3 / WinDriver-EXPLinks
This repo contains PoCs for vulnerable Windows drivers.
☆18Updated 4 months ago
Alternatives and similar repositories for WinDriver-EXP
Users that are interested in WinDriver-EXP are comparing it to the libraries listed below
Sorting:
- ☆157Updated 6 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆118Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆135Updated 3 months ago
- Yet another shellcode loader - but a sneaky one☆25Updated 8 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated last year
- ☆135Updated 11 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆118Updated 6 months ago
- A Mythic Agent written in PIC C.☆205Updated 10 months ago
- A hoontr must hoont☆102Updated 3 weeks ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆121Updated last year
- "Service-less" driver loading☆166Updated last year
- Permanently disable EDRs as local admin☆122Updated 2 months ago
- ☆27Updated 3 years ago
- Internal Monologue BOF☆78Updated 11 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆122Updated last year
- Utilities for obfuscating shellcode☆96Updated 3 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- ☆159Updated last year
- Attack chain emulator. Write recipes for initial access easily☆22Updated 9 months ago
- Mockingjay process self injection POC☆42Updated 2 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- Find DLLs with RWX section☆80Updated 2 years ago
- Windows x64 Exploitation Training☆15Updated 6 months ago
- Activation Context Hijack☆169Updated 4 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆11Updated 6 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆317Updated 2 months ago
- ☆28Updated last year
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆124Updated last month
- Situational Awareness script to identify how and where to run implants☆67Updated last year