maezyn / dolos
Metamorphic engine written in Rust.
☆13Updated 2 years ago
Alternatives and similar repositories for dolos:
Users that are interested in dolos are comparing it to the libraries listed below
- uefi diskless persistence technique + OVMF secureboot bypass☆53Updated 8 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆264Updated last year
- Rusty Arsenal - A collection of experimental Process Injection and Post-Exploitation Techniques in Rust☆244Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆155Updated last year
- Admin to Kernel code execution using the KSecDD driver☆246Updated 9 months ago
- Process Injection using Thread Name☆246Updated 4 months ago
- Collection of hypervisor detections☆213Updated 3 months ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆176Updated 3 months ago
- user-mode Rootkit☆101Updated 2 years ago
- ☆46Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆133Updated 2 years ago
- x86-64 code/pe virtualizer☆176Updated last month
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆226Updated 6 months ago
- ☆128Updated last month
- x86 PE Mutator☆212Updated 2 years ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆203Updated 2 months ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆206Updated last year
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆460Updated 2 years ago
- ☆84Updated 7 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆168Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆247Updated 4 months ago
- Call stack spoofing for Rust☆307Updated 4 months ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆190Updated 2 months ago
- Various Process Injection Techniques☆146Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆364Updated 11 months ago
- RISC-V Virtual Machine☆212Updated 3 weeks ago
- Exploitable drivers, you know what I mean☆130Updated 9 months ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆149Updated 2 years ago