malefax / AdrishyaLinks
Author of Project Adrishya a rootkit which use ftrace mechanism to hook syscall; (write this because God commanded me); work for both x86_64 and arm; CREDIT-(Oleksii Lozovskyi{ilammy})FOUNDER OF FTRACE HOOKING
☆17Updated this week
Alternatives and similar repositories for Adrishya
Users that are interested in Adrishya are comparing it to the libraries listed below
Sorting:
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Report and exploit of CVE-2023-36427☆90Updated last year
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆40Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆114Updated last year
- Repo with different exploits & PoCs☆64Updated 2 months ago
- dynamic binary instrumentation, analysis, and patching framework☆90Updated this week
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated last year
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆119Updated 2 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆95Updated last week
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆117Updated last year
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆84Updated 2 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆91Updated 2 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆78Updated 4 months ago
- A simple UEFI bootkit made by @NSG650 and me.☆26Updated 7 months ago
- Report and exploit of CVE-2024-21305.☆36Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆65Updated last year
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 9 months ago
- ELF static analysis and injection framework that parse, manipulate, patch and camouflage ELF files.☆112Updated last month
- Remove WPP calls from hexrays decompiled code☆52Updated 4 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆36Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 3 months ago
- ☆71Updated 2 years ago
- Kernel Read Write Execute☆84Updated 11 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆136Updated last year
- A few examples of how to trap virtual memory access on Windows.☆33Updated 7 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆94Updated 9 months ago
- A simple but useful project maybe help you reverse Windows.☆38Updated last year
- Abusing exceptions for code execution.☆111Updated 2 years ago
- Analysis of the vulnerability☆51Updated last year
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year