Bootkit for Windows Sandbox to disable DSE/PatchGuard.
☆325Oct 13, 2024Updated last year
Alternatives and similar repositories for SandboxBootkit
Users that are interested in SandboxBootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆270Aug 31, 2022Updated 3 years ago
- Easy Anti PatchGuard☆222Apr 9, 2021Updated 4 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆903Nov 21, 2019Updated 6 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆176Dec 5, 2022Updated 3 years ago
- Bypassing PatchGuard on modern x64 systems☆264Apr 9, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆24Feb 9, 2024Updated 2 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆202Jul 11, 2023Updated 2 years ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆491May 18, 2021Updated 4 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆556Nov 12, 2022Updated 3 years ago
- ☆147Jan 24, 2024Updated 2 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆388Jan 29, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code Injection, Inject malicious payload via pagetables pml4.☆243Jul 7, 2021Updated 4 years ago
- base for testing☆188Sep 28, 2024Updated last year
- ☆225Mar 11, 2023Updated 3 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆663Jan 28, 2025Updated last year
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆289Jan 27, 2025Updated last year
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆477Feb 18, 2021Updated 5 years ago
- A DTrace on Windows Reimplementation☆374Mar 12, 2026Updated 2 weeks ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆241Nov 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆389Aug 8, 2021Updated 4 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆208May 27, 2021Updated 4 years ago
- System call hook for Windows 10 20H1☆495Jun 26, 2021Updated 4 years ago
- UEFI bootkit for driver manual mapping☆591Jan 1, 2024Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆563Apr 8, 2025Updated 11 months ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆172May 17, 2023Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆98Aug 27, 2022Updated 3 years ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixer☆22Dec 29, 2021Updated 4 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆935Jul 20, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Native code virtualizer for x64 binaries☆521Dec 20, 2024Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆103Jun 26, 2023Updated 2 years ago
- Hooking kernel functions by abusing alignment☆250Jan 5, 2021Updated 5 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆85Nov 13, 2023Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆394Jul 6, 2022Updated 3 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆567Jan 4, 2025Updated last year