lil-skelly / basiliskLinks
☆17Updated 10 months ago
Alternatives and similar repositories for basilisk
Users that are interested in basilisk are comparing it to the libraries listed below
Sorting:
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆124Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆120Updated last year
- Admin to Kernel code execution using the KSecDD driver☆263Updated last year
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆90Updated 2 months ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆112Updated 2 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆107Updated last year
- Process Injection using Thread Name☆294Updated 9 months ago
- Windows rootkit designed to work with BYOVD exploits☆213Updated last year
- Windows UEFI Bootkit☆78Updated 2 months ago
- "Service-less" driver loading☆166Updated last year
- Activation Context Hijack☆169Updated 5 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆320Updated 2 years ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆209Updated 5 months ago
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Updated 10 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆268Updated last year
- A collection of position independent coding resources☆106Updated 2 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Updated 9 months ago
- Automated environment setup for Bootkit & Rootkit development.☆35Updated 5 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆75Updated 7 months ago
- PoC for popping a system shell against the LnvMSRIO.sys driver☆117Updated 3 months ago
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- Virtual Trust Level (VTL 1) secure call tracing☆86Updated 5 months ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆23Updated 10 months ago
- A Windows Named Pipe Multi-tool / Proxy☆283Updated last month
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆100Updated 2 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆592Updated 2 weeks ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆358Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆280Updated last year
- A universal binary patching dll.☆116Updated last year