waleedassar / RestrictedKernelLeaks
☆159Updated 3 years ago
Alternatives and similar repositories for RestrictedKernelLeaks:
Users that are interested in RestrictedKernelLeaks are comparing it to the libraries listed below
- ☆143Updated last year
- Unofficial Common Log File System (CLFS) Documentation☆176Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆87Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆225Updated 2 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆234Updated 3 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆103Updated 3 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆202Updated 4 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆203Updated 4 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆213Updated 2 years ago
- APC Internals Research Code☆164Updated 4 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆200Updated last week
- Windows LPE exploit for CVE-2022-37969☆133Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆225Updated 2 years ago
- Kernel Exploits☆251Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆110Updated 4 years ago
- Reverse engineered source code of the autochk rootkit☆201Updated 5 years ago
- PoC capable of detecting manual syscalls from usermode.☆193Updated 4 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆220Updated last year
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆137Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- Windows Kernel Programming☆126Updated 4 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆119Updated 5 years ago
- Exploitable drivers, you know what I mean☆132Updated last year
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆81Updated 4 years ago
- Windows API Hashes used in the malwares☆41Updated 9 years ago
- Abusing exceptions for code execution.☆110Updated 2 years ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆243Updated 2 years ago