milabs / kmatryoshkaLinks
Matryoshka - stacked LKM loader
☆54Updated 2 years ago
Alternatives and similar repositories for kmatryoshka
Users that are interested in kmatryoshka are comparing it to the libraries listed below
Sorting:
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Updated 9 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- ☆48Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- ☆90Updated 5 years ago
- ☆87Updated last year
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Helper idapython code for reversing kmdf drivers☆75Updated 3 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆124Updated 6 years ago
- ☆34Updated 9 years ago
- Simple 32/64-bit PEs loader.☆138Updated 6 years ago
- Process reimaging proof of concept code☆97Updated 6 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- Super IOCTL Basic Fuzzer☆15Updated 6 years ago
- ☆46Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- ☆115Updated 9 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- ☆28Updated 6 years ago