therealdreg / dregate
call gates as stable comunication channel for NT x86 and Linux x86_64
☆31Updated last year
Alternatives and similar repositories for dregate:
Users that are interested in dregate are comparing it to the libraries listed below
- ☆29Updated last month
- Windows AppLocker Driver (appid.sys) LPE☆47Updated 6 months ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆25Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆18Updated last month
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 5 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆45Updated 4 months ago
- Analysis of the vulnerability☆48Updated last year
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 3 months ago
- A work in progress BOF/COFF loader in Rust☆46Updated last year
- ☆29Updated last year
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- BYOVD collection☆21Updated 10 months ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆26Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆29Updated 7 months ago
- A more reliable way of resolving syscall numbers in Windows☆50Updated 11 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆23Updated 5 months ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆60Updated last year
- Report and exploit of CVE-2024-21305.☆36Updated last year
- API Hammering with C++20☆44Updated 2 years ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆17Updated 8 months ago
- using the gpu to hide your payload☆53Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 7 months ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- In-memory hiding technique☆45Updated 3 weeks ago