ic3qu33n / michelangelo-reanimatorLinks
Michelangelo REanimator bootkit and REcon 2023 talk slides/materials
☆30Updated last year
Alternatives and similar repositories for michelangelo-reanimator
Users that are interested in michelangelo-reanimator are comparing it to the libraries listed below
Sorting:
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Attacking the cleanup_module function of a kernel module☆55Updated 7 months ago
- Linux Sleep Obfuscation☆107Updated 2 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 10 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- ☆21Updated 2 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- CVE-2018-6066 using VBA☆68Updated 3 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆43Updated last year
- ☆52Updated 10 months ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Updated 5 years ago
- It's what all the kids are talking about☆12Updated 2 years ago
- A PoC packer written in Rust!☆74Updated 3 years ago
- Intel 64/Windows low-level experiments☆63Updated 5 months ago
- An example of COM hijacking using a proxy DLL.☆43Updated 4 years ago
- ☆10Updated 3 years ago
- ☆31Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆107Updated last year
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- ☆35Updated 2 years ago
- A simple Linux in-memory .so loader☆33Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- quASAR: ASAR manipulation made easy☆38Updated 3 years ago
- using the gpu to hide your payload☆63Updated 3 years ago