ksen-lin / nitara2Links
yet another hidden LKM hunter
☆29Updated last month
Alternatives and similar repositories for nitara2
Users that are interested in nitara2 are comparing it to the libraries listed below
Sorting:
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025☆59Updated 3 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- BINARLY Research Tools and PoCs☆38Updated last year
- ☆28Updated 6 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Attacking the cleanup_module function of a kernel module☆48Updated 3 months ago
- ☆48Updated 3 years ago
- Report and exploit of CVE-2023-36427☆88Updated last year
- ☆24Updated 11 months ago
- ☆12Updated 2 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆57Updated 3 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 5 months ago
- ☆83Updated 2 months ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 10 months ago
- ☆37Updated 7 months ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- Slides about HyperDbg☆39Updated 3 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago