harryanon / r0akView external linksLinks
☆108Sep 24, 2018Updated 7 years ago
Alternatives and similar repositories for r0ak
Users that are interested in r0ak are comparing it to the libraries listed below
Sorting:
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆89Nov 9, 2015Updated 10 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆38Dec 10, 2018Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- ☆34Sep 24, 2018Updated 7 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- A modern c++ implementation of windows heavens gate☆244Sep 19, 2020Updated 5 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- A wrapper library around native windows sytem APIs☆447Feb 2, 2021Updated 5 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Simple driver to register all available process, thread, image, Registry, and Object callbacks☆124Oct 5, 2017Updated 8 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Jun 21, 2020Updated 5 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- UEFI bootkit for driver manual mapping☆583Jan 1, 2024Updated 2 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago
- Detect manualmapped images remotely, without hassle☆152Nov 3, 2017Updated 8 years ago
- The Win32 Anti-Intrusion Library☆213May 30, 2019Updated 6 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- ☆23May 8, 2023Updated 2 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- POC for .NET mssql client for accessing database data through beacon☆64Sep 12, 2023Updated 2 years ago
- ☆409Mar 1, 2017Updated 8 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆114Aug 28, 2016Updated 9 years ago
- ☆24May 28, 2021Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- A small wrapper class providing an unified interface to search for various memory signatures☆79Feb 2, 2022Updated 4 years ago
- C++ Exceptions in Windows Drivers☆221Dec 21, 2020Updated 5 years ago
- Research on Windows Kernel Executive Callback Objects☆315Feb 22, 2020Updated 5 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Phantom DLL hollowing PoC☆370May 23, 2022Updated 3 years ago