allowing um r/w through km from um ioctl ™
☆11Jan 2, 2022Updated 4 years ago
Alternatives and similar repositories for rw
Users that are interested in rw are comparing it to the libraries listed below
Sorting:
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- ☆30Oct 13, 2020Updated 5 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtime☆45Mar 13, 2025Updated 11 months ago
- ☆10Oct 3, 2016Updated 9 years ago
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- Exploits Intel's signed iqvw64e.sys driver to allow manual mapping and read/writing of memory at a kernel level.☆13Jun 1, 2019Updated 6 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- run ssh, https, and openvpn on the same port☆15Feb 5, 2014Updated 12 years ago
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- r0akmap is a PoC driver manual mapper based on r0ak☆38Aug 18, 2018Updated 7 years ago
- X86/X64 Hardware Breakpoint Manager☆42Jun 18, 2021Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Jul 12, 2021Updated 4 years ago
- Exploit MsIo vulnerable driver☆127Aug 12, 2021Updated 4 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Aug 19, 2022Updated 3 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- Call arbitrary Windows kernel-mode functions from Python on another machine☆44Sep 17, 2021Updated 4 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Dec 22, 2021Updated 4 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆23Jul 15, 2021Updated 4 years ago
- Easy encrypt/decrypt data with TPM☆25Feb 28, 2024Updated 2 years ago
- ☆23May 8, 2023Updated 2 years ago
- ☆24May 26, 2021Updated 4 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- ☆44Jul 11, 2023Updated 2 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Jul 5, 2023Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- ☆23Jul 24, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- My Proof of Concept code for different publicly disclosed vulnerabilities☆48May 15, 2024Updated last year