ksen-lin / nitara2
yet another hidden LKM hunter
☆13Updated last year
Related projects ⓘ
Alternatives and complementary repositories for nitara2
- An injector that use PT_LOAD technique☆11Updated last year
- Code injection from Linux kernel to a process☆19Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆30Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆43Updated 3 weeks ago
- PoC code and tools for Black Hat USA 2024☆15Updated 3 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆28Updated 8 months ago
- ☆26Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆24Updated 3 years ago
- BINARLY Research Tools and PoCs☆34Updated last month
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆25Updated 11 months ago
- Slide of my conference presentations☆11Updated 2 months ago
- Analysis of the vulnerability☆46Updated 9 months ago
- A UEFI extraction tool☆11Updated this week
- One Bootloader to Load Them All - Research materials, Code , Etc.☆47Updated 2 years ago
- ☆26Updated last week
- ☆14Updated 2 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆26Updated 3 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆33Updated 3 years ago
- A MBR Fuzzer☆28Updated 7 months ago
- ☆25Updated last week
- Skeleton project for your own GRUB-based bootkit☆15Updated 4 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆49Updated 2 years ago
- PyKD DLLs for x86 and x64 platforms☆14Updated last year
- Here are some of my malware reversing papers that I will be publishing☆31Updated 2 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆13Updated last year
- ☆24Updated last year
- A collection of various exploits☆25Updated last month
- ☆12Updated 2 years ago