ioncodes / ceload
BYOVD: Loading dbk64.sys and grabbing a handle to it
☆149Updated 2 years ago
Alternatives and similar repositories for ceload:
Users that are interested in ceload are comparing it to the libraries listed below
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- ☆142Updated last year
- Resolve DOS MZ executable symbols at runtime☆96Updated 3 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆129Updated 6 months ago
- Browse Page Tables on Windows (Page Table Viewer)☆196Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆203Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆232Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆274Updated 5 months ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆167Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆225Updated 2 years ago
- APC Internals Research Code☆162Updated 4 years ago
- Advanced driver monitoring utility.☆206Updated 2 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆149Updated last year
- Bypassing PatchGuard on modern x64 systems☆254Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆193Updated 4 months ago
- Debugger Anti-Detection Benchmark☆311Updated last year
- compile-time control flow obfuscation using mba☆181Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- Load your driver like win32k.sys☆252Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆183Updated 3 weeks ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆172Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆292Updated 2 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆276Updated last year
- PoC capable of detecting manual syscalls from usermode.☆192Updated 4 months ago
- IDA Pro plugin to make bitfield accesses easier to grep☆232Updated last month
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆194Updated last month
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆141Updated 2 years ago