jsacco / PPL_Bypass
☆12Updated 2 years ago
Alternatives and similar repositories for PPL_Bypass:
Users that are interested in PPL_Bypass are comparing it to the libraries listed below
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 2 years ago
- A VMWare logger using built-in backdoor.☆27Updated 3 months ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- ☆27Updated 6 months ago
- Process Injection: APC Injection☆29Updated 4 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 9 months ago
- ☆17Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated 11 months ago
- ☆21Updated 8 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 7 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆30Updated 2 years ago
- In-memory hiding technique☆45Updated last week
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 5 months ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 2 years ago
- ☆27Updated 2 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆30Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆24Updated last year
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆25Updated last year
- ☆105Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- ☆22Updated last year