malefax / AdrishyaLinks
Author of Project Adrishya a rootkit which use ftrace mechanism to hook syscall; (write this because God commanded me); work for both x86_64 and arm; CREDIT-(Oleksii Lozovskyi{ilammy})FOUNDER OF FTRACE HOOKING
☆27Updated 4 months ago
Alternatives and similar repositories for Adrishya
Users that are interested in Adrishya are comparing it to the libraries listed below
Sorting:
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆150Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Repo with different exploits & PoCs☆66Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- Windows KASLR bypass using prefetch side-channel☆174Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆54Updated 8 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated 2 years ago
- Analysis of the vulnerability☆50Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- Reverse Engineering 101 training from our Vulnerability Researcher Development Program (VRDP)☆60Updated 3 weeks ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆65Updated 9 months ago
- ☆38Updated last year
- V8sandbox_bypass using stack misalignment☆23Updated last year
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Updated last month
- Proof-of-Concept for CVE-2024-26218☆55Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated 4 months ago
- Report and exploit of CVE-2023-36427☆90Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆164Updated 2 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated last year
- ☆85Updated 5 months ago
- Attacking the cleanup_module function of a kernel module☆55Updated 7 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆90Updated 3 months ago
- ☆33Updated 2 years ago
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025☆60Updated 6 months ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆48Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year