ic3qu33n / michelangelo-reanimator
Michelangelo REanimator bootkit and REcon 2023 talk slides/materials
☆29Updated last year
Alternatives and similar repositories for michelangelo-reanimator:
Users that are interested in michelangelo-reanimator are comparing it to the libraries listed below
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- ☆18Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆73Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆27Updated 3 years ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- BINARLY Research Tools and PoCs☆36Updated 7 months ago
- Proof-of-concept modular implant platform leveraging v8☆52Updated 2 months ago
- rpv-web is a browser based frontend for the rpv library☆25Updated last week
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 11 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 6 months ago
- yet another hidden LKM hunter☆22Updated last year
- ☆45Updated last month
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆47Updated 11 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 4 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated last year
- Google Chrome Use After Free☆56Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Analysis of the vulnerability☆51Updated last year
- ☆29Updated 2 months ago
- ☆30Updated 5 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆30Updated 3 weeks ago
- ☆28Updated 11 months ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- Proof-of-Concept for CVE-2024-26218☆51Updated last year
- Attack chain emulator. Write recipes for initial access easily☆20Updated 2 months ago
- Linux Sleep Obfuscation☆97Updated last year
- An In-memory Embedding of CPython☆28Updated 3 years ago