kkent030315 / anyelevateView external linksLinks
x64 Windows privilege elevation using anycall
☆22May 28, 2021Updated 4 years ago
Alternatives and similar repositories for anyelevate
Users that are interested in anyelevate are comparing it to the libraries listed below
Sorting:
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆46Jun 3, 2021Updated 4 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆37Oct 26, 2020Updated 5 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- Two PoC of accessing process virtual memory via NT Kernel☆22Jun 25, 2021Updated 4 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- X86/X64 Hardware Breakpoint Manager☆42Jun 18, 2021Updated 4 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆199Feb 14, 2024Updated 2 years ago
- ☆16Mar 1, 2019Updated 6 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆385Jul 6, 2022Updated 3 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- Various shellcodes☆13Sep 1, 2020Updated 5 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- ☆30Oct 13, 2020Updated 5 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- collection of code snippets,windbg,python scripts and resources☆14Jul 11, 2022Updated 3 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- ☆11Apr 12, 2024Updated last year
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- ☆25Mar 3, 2019Updated 6 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- ☆12Oct 12, 2021Updated 4 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- KNSoft.NDK provides native C/C++ definitions and import libraries for Windows NT.☆20Feb 9, 2026Updated last week