therealdreg / okhiLinks
Open Keylogger Hardware Implant - USB & PS2 Keyboards
☆77Updated last month
Alternatives and similar repositories for okhi
Users that are interested in okhi are comparing it to the libraries listed below
Sorting:
- FTDI bricker just for fun - malware POC+hardware hacking CTF☆21Updated 9 months ago
- ☆57Updated 2 months ago
- ☆18Updated last month
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆100Updated last year
- ☆30Updated 7 months ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- EvtPsst☆55Updated last year
- A more reliable way of resolving syscall numbers in Windows☆51Updated last year
- An In-memory Embedding of CPython☆29Updated 4 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- Reports on Driver, LSASS and other security services mitigations☆24Updated last week
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆113Updated 10 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Nim process hollowing loader☆57Updated 11 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆25Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆61Updated 10 months ago
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆41Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆88Updated last month
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆83Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- ☆67Updated 5 months ago
- Exploitable drivers, you know what I mean☆150Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- ☆35Updated last year