ionescu007 / r0akView external linksLinks
☆35Sep 24, 2018Updated 7 years ago
Alternatives and similar repositories for r0ak
Users that are interested in r0ak are comparing it to the libraries listed below
Sorting:
- ☆108Sep 24, 2018Updated 7 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- ☆24May 28, 2021Updated 4 years ago
- C Header Only Library for Virii☆12Nov 17, 2020Updated 5 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- WNF Utilities 4 Newbies (WNFUN)☆101Dec 6, 2018Updated 7 years ago
- Resolve DOS MZ executable symbols at runtime☆96Nov 12, 2021Updated 4 years ago
- very simple masm64 example to demonstrate how to compile MASM 64 bit using NMake/CMake☆14Aug 23, 2022Updated 3 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆37Oct 21, 2020Updated 5 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- A poc that abuses Enclave☆40Sep 8, 2022Updated 3 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- Windows System Programming Experiments☆223Jun 13, 2022Updated 3 years ago
- A pattern for a self-installing Windows service in C# with the unstoppable attributes in C#.☆67Jan 19, 2019Updated 7 years ago
- Finding Truth in the Shadows☆120Jan 26, 2023Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- ☆16May 15, 2021Updated 4 years ago
- Wow64 Heaven's Gate Hook☆29Jul 28, 2021Updated 4 years ago
- ☆18Apr 4, 2019Updated 6 years ago