trailofbits / HVCI-loldrivers-checkLinks
☆56Updated 2 years ago
Alternatives and similar repositories for HVCI-loldrivers-check
Users that are interested in HVCI-loldrivers-check are comparing it to the libraries listed below
Sorting:
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆77Updated last year
- ☆113Updated 3 years ago
- Small tool to play with IOCs caused by Imageload events☆43Updated 2 years ago
- ☆31Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆136Updated this week
- ☆21Updated 2 years ago
- ☆27Updated 2 years ago
- ☆76Updated 3 years ago
- CVE-2018-6066 using VBA☆68Updated 3 years ago
- a tiny program to consume from ETW providers for research☆53Updated 11 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 3 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆118Updated last year
- ☆34Updated 2 years ago
- EvtPsst☆55Updated 2 years ago
- A C++ PoC implementation for enumerating Windows Fibers directly from memory☆21Updated last year
- A Poc on blocking Procmon from monitoring network events☆109Updated 4 months ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆46Updated 2 years ago
- ☆47Updated 6 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Updated 3 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆17Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- ☆52Updated 8 months ago
- ☆83Updated last year
- ☆108Updated last year
- Piece of code to detect and remove hooks in IAT☆65Updated 3 years ago