ic3qu33n / michelangelo-reanimator
Michelangelo REanimator bootkit and REcon 2023 talk slides/materials
☆28Updated last year
Alternatives and similar repositories for michelangelo-reanimator:
Users that are interested in michelangelo-reanimator are comparing it to the libraries listed below
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- A few examples of how to trap virtual memory access on Windows.☆29Updated 3 months ago
- Proof-of-concept modular implant platform leveraging v8☆51Updated last month
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 6 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 8 months ago
- ☆30Updated 4 months ago
- BINARLY Research Tools and PoCs☆36Updated 6 months ago
- Load a dynamic library from memory using a fuse mount☆31Updated last year
- ☆41Updated 3 weeks ago
- A payload delivery system which embeds payloads in an executable's icon file!☆73Updated last year
- Linux Sleep Obfuscation☆95Updated last year
- yet another hidden LKM hunter☆21Updated last year
- ☆18Updated last year
- ☆20Updated this week
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated 11 months ago
- ☆10Updated 2 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- A work in progress BOF/COFF loader in Rust☆46Updated 2 years ago
- ☆12Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Updated last year
- An In-memory Embedding of CPython☆27Updated 3 years ago
- Proof-of-Concept for CVE-2024-26218☆51Updated 11 months ago
- ☆35Updated last month
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 10 months ago
- Enabled / Disable LSA Protection via BYOVD☆66Updated 3 years ago