tr3sp4ss3rexe / Windows-Kernel-Exploitation
Some basic info, resources, and code snippets about windows kernel exploitation
☆10Updated 2 years ago
Alternatives and similar repositories for Windows-Kernel-Exploitation:
Users that are interested in Windows-Kernel-Exploitation are comparing it to the libraries listed below
- ☆33Updated 2 years ago
- ☆18Updated last year
- using the gpu to hide your payload☆54Updated 2 years ago
- Offensive Assembly code snippets.☆12Updated last year
- ☆19Updated 2 months ago
- CSharp4Pentesters☆12Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated 9 months ago
- OFFZONE 2024 Malware Persistence workshop☆17Updated 2 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆18Updated last week
- ☆15Updated this week
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- ☆29Updated 10 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆52Updated 2 years ago
- IDA Python scripts☆30Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 5 months ago
- ☆18Updated last month
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- ☆12Updated 4 years ago