☆35Sep 24, 2018Updated 7 years ago
Alternatives and similar repositories for r0ak
Users that are interested in r0ak are comparing it to the libraries listed below
Sorting:
- ☆108Sep 24, 2018Updated 7 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- ☆23May 28, 2021Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- very simple masm64 example to demonstrate how to compile MASM 64 bit using NMake/CMake☆14Aug 23, 2022Updated 3 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- The driver STL library used by myself☆13Oct 19, 2022Updated 3 years ago
- A poc that abuses Enclave☆40Sep 8, 2022Updated 3 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Resolve DOS MZ executable symbols at runtime☆96Nov 12, 2021Updated 4 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆26Jan 1, 2017Updated 9 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- ☆25May 21, 2021Updated 4 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆38Oct 21, 2020Updated 5 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago
- C++ Exceptions in Windows Drivers☆222Dec 21, 2020Updated 5 years ago
- WNF Utilities 4 Newbies (WNFUN)☆102Dec 6, 2018Updated 7 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆241Nov 6, 2019Updated 6 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- 热门网络游戏辅助开发教程☆15Jan 7, 2021Updated 5 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 5 months ago
- PE (EXE) File Embed wrap, injection of DLL/ASI (based on pefrmdllembed)☆22Dec 25, 2024Updated last year
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Windows System Programming Experiments☆222Jun 13, 2022Updated 3 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Jan 15, 2021Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago
- Two PoC of accessing process virtual memory via NT Kernel☆22Jun 25, 2021Updated 4 years ago
- ☆12Aug 10, 2019Updated 6 years ago