klezVirus / AIDA64DRIVER-EoPLinks
AIDA64DRIVER Elevation of Privilege Vulnerability
☆15Updated last year
Alternatives and similar repositories for AIDA64DRIVER-EoP
Users that are interested in AIDA64DRIVER-EoP are comparing it to the libraries listed below
Sorting:
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated 2 years ago
- A work in progress BOF/COFF loader in Rust☆50Updated 2 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Updated 3 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43Updated 2 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆42Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Updated 10 months ago
- A bunch of shenanigans using functions, VEH and more☆37Updated 7 months ago
- A reimplementation of Cobalt Strike's Beacon Object File (BOF) Loader☆64Updated 2 years ago
- Small tool to play with IOCs caused by Imageload events☆44Updated 2 years ago
- ☆60Updated 3 years ago
- API Hammering with C++20☆49Updated 3 years ago
- Get your data from the resource section manually, with no need for windows apis☆66Updated last year
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Updated 10 months ago
- idk man this was the default github name☆35Updated 2 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Updated last year
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Updated 9 months ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Updated 2 years ago
- ☆44Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66Updated 2 years ago
- Sleep Obfuscation☆45Updated 3 years ago
- Hooked create process injection for meterpreter☆23Updated 4 years ago
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Updated 2 years ago
- A simple Linux in-memory .so loader☆33Updated 2 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆74Updated last year
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆21Updated last year
- ☆42Updated 11 months ago
- A more reliable way of resolving syscall numbers in Windows☆54Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Updated 2 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago