scumjr / the-sea-watcherLinks
Implementation of the SMM rootkit "The Watcher"
☆128Updated 3 years ago
Alternatives and similar repositories for the-sea-watcher
Users that are interested in the-sea-watcher are comparing it to the libraries listed below
Sorting:
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- C++-based shellcode builder☆114Updated 4 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆134Updated 9 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- ☆49Updated 7 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- Cross Architecture Shellcode in C☆202Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆76Updated 7 years ago
- ☆138Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- A Python tool to generate ROP chains☆64Updated 5 months ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆135Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 7 years ago
- SHURIKEN: Exploit throwing framework☆37Updated 9 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- grap: define and match graph patterns within binaries☆171Updated 4 years ago
- ☆61Updated 9 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆99Updated 8 years ago