a tiny code that performs kernel-mode read/write using CVE-2023-38817.
☆18Mar 28, 2025Updated 11 months ago
Alternatives and similar repositories for kur
Users that are interested in kur are comparing it to the libraries listed below
Sorting:
- C# asynchronous KCP protocol implementation. (ported from https://github.com/skywind3000/kcp)☆29Mar 16, 2022Updated 3 years ago
- ☆31Oct 23, 2023Updated 2 years ago
- Anti-rootkit works as a Windows system driver.☆13Mar 14, 2022Updated 3 years ago
- ☆13Dec 10, 2020Updated 5 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- A C Implementation for using a new method to invoke undetectable indirect syscalls☆20Dec 2, 2025Updated 3 months ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- ☆15Nov 19, 2023Updated 2 years ago
- Dump LSASS by spoofing command line arguments to procdump.☆20Oct 21, 2024Updated last year
- Execute anything in a legit memory region by attacking a windows driver☆20Aug 20, 2023Updated 2 years ago
- ☆29Dec 29, 2022Updated 3 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 9 months ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- simple driver to read and write☆19Apr 13, 2025Updated 10 months ago
- 学习windows驱动相关☆23Jul 31, 2019Updated 6 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- ☆26Apr 24, 2025Updated 10 months ago
- Append custom data to signed pe file and DONOT DESTROY SIGNED STATUS.☆26Mar 13, 2021Updated 4 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- reverse socks tunneler with ntlm and proxy support☆28Nov 24, 2019Updated 6 years ago
- More EFS coerced authentication method with PetitPotam.py☆27Mar 21, 2023Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆35Aug 13, 2017Updated 8 years ago
- improved shellcode template for b1tg/rust-windows-shellcode☆29May 12, 2021Updated 4 years ago
- ☆30Mar 21, 2023Updated 2 years ago
- IAT Hooking POC (x86 / x64) - Hook functions through the IAT☆36Jul 29, 2024Updated last year
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Mar 17, 2023Updated 2 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆15Sep 7, 2023Updated 2 years ago
- Random CVEs☆34May 10, 2025Updated 9 months ago
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- Windows (ShadowMove) Socket Duplication☆87Apr 19, 2020Updated 5 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆53Sep 20, 2022Updated 3 years ago