Windows kernel ROP-only implant exposing R/W primitives
☆53Feb 1, 2026Updated 3 months ago
Alternatives and similar repositories for roprw
Users that are interested in roprw are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Deobfuscation and Analysis of Ring-1.io☆94Feb 7, 2026Updated 3 months ago
- ☆16Feb 27, 2026Updated 2 months ago
- Use XIGNCODE3 driver to cheat☆62May 1, 2026Updated 2 weeks ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- A custom implementation of the Nanomites protection technology for Windows executables (x86 and x64) originally introduced by Silicon Rea…☆36Jan 11, 2026Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆99Feb 1, 2026Updated 3 months ago
- A simple C++ driver base with KD data block☆11Jun 25, 2022Updated 3 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Usermode exploit to bypass any AC using a 0day shatter attack.☆276Nov 26, 2025Updated 5 months ago
- Direct3D 9 to 11 sharing demo☆12Nov 30, 2018Updated 7 years ago
- An advanced singular header-only C++20 obfuscation library with encryption and polymorphism.☆108Apr 10, 2026Updated last month
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 6 months ago
- anti cheat drv open source☆19Apr 18, 2024Updated 2 years ago
- A .data pointer hook with communication in windows 11☆46Nov 9, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- IDA scripts for hypervisor (Hyper-v) analysis and reverse engineering automation☆27Dec 7, 2021Updated 4 years ago
- Fixes the "Device\Nal is already in use" error on kdmapper.☆20Jan 9, 2023Updated 3 years ago
- An AVX Lifter for the Hex-Rays Decompiler + new instructions☆11Oct 14, 2022Updated 3 years ago
- Teach how to start the game(on steam) without steam☆20Aug 1, 2025Updated 9 months ago
- GameOverlayRenderer64.dll or Steam's overlay renderering software is extremely vulnerable in very many ways, I've decided to reverse engi…☆14Jun 28, 2022Updated 3 years ago
- Modmap updated to work on Windows 11☆28Jul 30, 2021Updated 4 years ago
- Decoder for VMProtect hwids☆18Aug 1, 2022Updated 3 years ago
- C++ Alt syscall hook in 25h2 can be load by KDU☆27Feb 18, 2026Updated 3 months ago
- A minimalistic way to spoof return addresses without using exceptions☆19Jul 26, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆11Sep 25, 2021Updated 4 years ago
- ☆10Dec 28, 2023Updated 2 years ago
- PoC for popping a system shell against the LnvMSRIO.sys driver☆122Oct 6, 2025Updated 7 months ago
- PoC kernel to usermode injection☆116Feb 26, 2024Updated 2 years ago
- A C++ Config System☆14Dec 15, 2023Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆47Sep 3, 2023Updated 2 years ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆56Dec 30, 2025Updated 4 months ago
- Squad Server Management Script Framework☆13May 15, 2020Updated 6 years ago
- APEX_ESP_AIMBOT☆18Jul 1, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆68Jan 23, 2023Updated 3 years ago
- ☆15May 2, 2024Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆160Jul 31, 2022Updated 3 years ago
- ☆17Apr 10, 2025Updated last year
- C++ Unity Il2Cpp Hacking API☆16Apr 16, 2025Updated last year
- Simple, fast and lightweight Header-Only C++ Assembler Library☆143Aug 13, 2025Updated 9 months ago