mrexodia / perfect-dll-proxy
Perfect DLL Proxying using forwards with absolute paths.
☆228Updated 5 months ago
Related projects: ⓘ
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆151Updated 2 months ago
- Admin to Kernel code execution using the KSecDD driver☆232Updated 5 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆247Updated 8 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆101Updated 3 weeks ago
- Process Injection using Thread Name☆228Updated 3 weeks ago
- Debugger Anti-Detection Benchmark☆283Updated 9 months ago
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆227Updated last year
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆148Updated 8 months ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆260Updated last year
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆272Updated last month
- For when DLLMain is the only way☆340Updated 4 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆229Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆251Updated 2 years ago
- Single header version of System Informer's phnt library.☆172Updated 3 months ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆172Updated last year
- The best theme for x64dbg!☆78Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆150Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆206Updated last year
- Signtool for expired certificates☆441Updated last year
- ☆212Updated last week
- Loading dbk64.sys and grabbing a handle to it☆148Updated 2 years ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆202Updated last month
- Native code virtualizer for x64 binaries☆355Updated this week
- Using Windows' own bootloader as a shim to bypass Secure Boot☆128Updated 2 months ago
- PoC Anti-Rootkit to uncover Windows Drivers/Rootkits mapped to Kernel Memory.☆138Updated this week
- A small x64 library to load dll's into memory.☆422Updated 10 months ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆168Updated last year
- Bypassing PatchGuard on modern x64 systems☆238Updated last year
- compile-time control flow obfuscation using mba☆172Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆221Updated 2 years ago