ic3qu33n / michelangelo-reanimatorLinks
Michelangelo REanimator bootkit and REcon 2023 talk slides/materials
☆30Updated last year
Alternatives and similar repositories for michelangelo-reanimator
Users that are interested in michelangelo-reanimator are comparing it to the libraries listed below
Sorting:
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 8 months ago
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- A few examples of how to trap virtual memory access on Windows.☆31Updated 6 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- ☆31Updated 2 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆31Updated 11 months ago
- CVE-2018-6066 using VBA☆65Updated 2 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- ☆48Updated 3 months ago
- Analysis of the vulnerability☆51Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- Linux Sleep Obfuscation☆103Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆19Updated 6 months ago
- Proof-of-Concept for CVE-2024-26218☆51Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- A simple UEFI bootkit made by @NSG650 and me.☆25Updated 6 months ago
- ☆19Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆100Updated last year
- ☆30Updated 7 months ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 4 months ago
- An In-memory Embedding of CPython☆28Updated 4 years ago
- Google Chrome Use After Free☆57Updated 3 years ago
- Enabled / Disable LSA Protection via BYOVD☆70Updated 3 years ago
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆30Updated 3 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago