tr3sp4ss3rexe / Windows-Kernel-Exploitation
Some basic info, resources, and code snippets about windows kernel exploitation
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Windows-Kernel-Exploitation
- ☆33Updated last year
- ☆18Updated 11 months ago
- Offensive Assembly code snippets.☆10Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆25Updated 3 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- using the gpu to hide your payload☆47Updated 2 years ago
- CSharp4Pentesters☆12Updated 2 years ago
- Get started with writing your first ever Windows Driver☆29Updated last year
- IAT Unhooking proof-of-concept☆28Updated 7 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated 11 months ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆38Updated 10 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 4 months ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 2 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 4 years ago
- ☆12Updated 4 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆12Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆12Updated 2 weeks ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆34Updated 6 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆58Updated 3 weeks ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- ☆12Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆14Updated last year
- A collection of PoCs for different injection techniques on Windows!☆42Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year