r0keb / MunIntelLinks
kASLR bypass technique on Intel CPUs.
☆14Updated last month
Alternatives and similar repositories for MunIntel
Users that are interested in MunIntel are comparing it to the libraries listed below
Sorting:
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆39Updated last week
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆23Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆16Updated 3 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆31Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated last year
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆31Updated last year
- ☆15Updated last week
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆55Updated 2 years ago
- A 64 bit executable junk code engine for polymorphic malware.☆43Updated last week
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- ☆40Updated 4 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 9 months ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- ☆11Updated 3 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- A few examples of how to trap virtual memory access on Windows.☆31Updated 6 months ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago
- An attempt at reversing WindowsDefender☆20Updated 8 months ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆42Updated 2 years ago
- A VMWare logger using built-in backdoor.☆30Updated 8 months ago
- bootkit驱动映射,三环进程注入加载指定模块☆14Updated 8 months ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆70Updated 2 months ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Rookit and anti rookit on Windows platform☆12Updated last year
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 3 years ago