jsacco / ntoskrnlwalkerLinks
Resolve offsets, gadgets and symbols from NTKernel
☆56Updated 3 weeks ago
Alternatives and similar repositories for ntoskrnlwalker
Users that are interested in ntoskrnlwalker are comparing it to the libraries listed below
Sorting:
- Translate virtual addresses to physical addresses from usermode.☆101Updated last year
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆85Updated last week
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆116Updated 3 months ago
- "Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), modify read-o…☆47Updated 3 weeks ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆300Updated 2 months ago
- ☆115Updated 2 months ago
- DSE & PG bypass via BYOVD attack☆77Updated 7 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- browse microsoft driver server for potentially vulnerable drivers☆30Updated last year
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆293Updated 2 months ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆75Updated last month
- ntoskrnl .data hooks for UM-KM communication☆53Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆133Updated 2 years ago
- Usermode exploit to bypass any AC using a 0day shatter attack.☆253Updated 2 months ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆214Updated 5 months ago
- Reverse engineering winapi function loadlibrary.☆232Updated 2 years ago
- kernel-mode DLL Injector☆125Updated 9 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆225Updated last year
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Updated 10 months ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆166Updated 2 years ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆160Updated 2 weeks ago
- Spoof the return address of any function call.☆11Updated last year
- C++ Assembler with Built-in Mutation Engine☆30Updated 5 months ago
- ☆46Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Updated 2 years ago
- Finding Truth in the Shadows☆120Updated 3 years ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆253Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆92Updated 3 months ago
- Windows Kernel Rootkit☆58Updated 2 months ago
- ☆14Updated last year