milabs / kmatryoshkaLinks
Matryoshka - stacked LKM loader
☆53Updated last year
Alternatives and similar repositories for kmatryoshka
Users that are interested in kmatryoshka are comparing it to the libraries listed below
Sorting:
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Updated 9 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- ☆48Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- FLARE Kernel Shellcode Loader☆179Updated 6 years ago
- Process reimaging proof of concept code☆96Updated 6 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- Simple 32/64-bit PEs loader.☆138Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 5 years ago
- ☆90Updated 4 years ago
- Super IOCTL Basic Fuzzer☆15Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆124Updated 6 years ago
- ☆46Updated 6 years ago
- ☆87Updated 11 months ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆94Updated 6 years ago
- ☆28Updated 6 years ago