stong / CVE-2020-15368
CVE-2020-15368, aka "How to exploit a vulnerable driver"
☆451Updated 2 years ago
Alternatives and similar repositories for CVE-2020-15368:
Users that are interested in CVE-2020-15368 are comparing it to the libraries listed below
- A library to develop kernel level Windows payloads for post HVCI era☆383Updated 3 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆523Updated 10 months ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆691Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆694Updated 3 weeks ago
- My personal cheat sheet for using WinDbg for kernel debugging☆396Updated 3 months ago
- Internals information about Hyper-V☆684Updated 3 weeks ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆340Updated 3 months ago
- My notes while studying Windows internals☆409Updated last month
- Original C Implementation of the Hell's Gate VX Technique☆989Updated 3 years ago
- Yet another windows internals repo☆205Updated 3 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,071Updated 2 years ago
- Obfuscate specific windows apis with different apis☆986Updated 3 years ago
- HashDB API hash lookup plugin for IDA Pro☆301Updated 3 months ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆587Updated 2 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆774Updated 11 months ago
- A generic UEFI bootkit used to achieve initial usermode execution. It works with modifications.☆407Updated last year
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆641Updated 10 months ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆549Updated 2 years ago
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆313Updated 10 months ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆522Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆230Updated 3 years ago
- Yet another variant of Process Hollowing☆363Updated this week
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆723Updated 10 months ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆347Updated 4 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆133Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,152Updated 9 months ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆568Updated this week
- X86 Mutation Engine with Portable Executable compatibility.☆478Updated 2 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆736Updated 6 months ago
- Extract Windows Defender database from vdm files and unpack it☆436Updated 4 years ago