red4000 / ZMISTLinks
Updated z0mbie MISTFALL engine
☆16Updated 7 years ago
Alternatives and similar repositories for ZMIST
Users that are interested in ZMIST are comparing it to the libraries listed below
Sorting:
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆88Updated 9 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆233Updated 5 years ago
- Add an empty section to a PE file☆53Updated 8 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- APC Internals Research Code☆168Updated 5 years ago
- Enumerate user mode shared memory mappings on Windows.☆123Updated 4 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆93Updated 3 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆183Updated 5 months ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- ☆163Updated 4 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆85Updated 5 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆145Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆158Updated 3 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 5 years ago
- ☆147Updated 2 years ago
- I was challenged by a friend to list all the processes and drivers in a system using more "unusual" methods. By doing this I learned quit…☆14Updated 9 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆121Updated 6 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆98Updated 6 years ago
- Windows Drivers☆98Updated 6 years ago
- Yet another windows internals repo☆208Updated 4 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆143Updated 6 years ago