therealdreg / cgaty
Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)
☆70Updated last year
Alternatives and similar repositories for cgaty:
Users that are interested in cgaty are comparing it to the libraries listed below
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- ☆58Updated 2 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆55Updated 3 years ago
- ☆29Updated 3 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆37Updated 2 years ago
- ☆45Updated 4 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- ☆18Updated 4 years ago
- ☆25Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- ☆33Updated 3 years ago
- PyKD DLLs for x86 and x64 platforms☆17Updated last year
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- clone of armadillo patched for windows☆47Updated 4 months ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆34Updated 3 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆61Updated last year
- Yet another Windows DLL injector.☆38Updated 3 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆59Updated 6 months ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆26Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- A code parser for C-Style header files that lets you to parse function's prototypes and data types used in their parameters.☆93Updated 2 years ago
- A Windows API hooking library !☆31Updated 2 years ago
- A research project about Windows notify routines.☆35Updated 4 years ago
- ☆22Updated 4 years ago
- Application Verifier Dynamic Fault Injection☆36Updated this week