Usermode exploit to bypass any AC using a 0day shatter attack.
☆275Nov 26, 2025Updated 5 months ago
Alternatives and similar repositories for WaryasSWHE
Users that are interested in WaryasSWHE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆75Jan 19, 2026Updated 3 months ago
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆100Feb 1, 2026Updated 3 months ago
- Windows kernel ROP-only implant exposing R/W primitives☆52Feb 1, 2026Updated 3 months ago
- ☆100Oct 25, 2025Updated 6 months ago
- WinDbg-ext-MCP bridges your favorite LLM client (like Cursor, Claude, or VS Code) with WinDbg, enabling real-time, AI assisted kernel deb…☆101Sep 10, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Achieving code execution through abusing vectored exception handling☆17May 28, 2023Updated 2 years ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- tests to catch some sloppy hv impls☆36Mar 16, 2026Updated last month
- C++ Alt syscall hook in 25h2 can be load by KDU☆27Feb 18, 2026Updated 2 months ago
- VMProtect2 Deobfuscation Tooling☆113Nov 12, 2025Updated 5 months ago
- ☆23Oct 18, 2021Updated 4 years ago
- A custom implementation of the Nanomites protection technology for Windows executables (x86 and x64) originally introduced by Silicon Rea…☆36Jan 11, 2026Updated 3 months ago
- Awesome MalDev Links☆62Apr 28, 2026Updated last week
- ☆24Jul 15, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆369May 11, 2025Updated 11 months ago
- VTIL2 is a ground-up reimagination of the VTIL Project, completely rewritten in modern C# with enterprise-grade architecture, performance…☆67Oct 29, 2025Updated 6 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆148Apr 12, 2024Updated 2 years ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆226Aug 31, 2025Updated 8 months ago
- nmi stackwalking + module verification☆168Dec 28, 2023Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆246Jan 24, 2025Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆46Sep 3, 2023Updated 2 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆16Sep 21, 2019Updated 6 years ago
- Hijacking Hyper-V at Runtime with DDMA☆129Aug 13, 2025Updated 8 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- COM-based DLL Surrogate Injection☆169Dec 9, 2025Updated 5 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆44Jul 29, 2025Updated 9 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆132Dec 24, 2025Updated 4 months ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆212Apr 23, 2026Updated 2 weeks ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆110Apr 23, 2026Updated 2 weeks ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆33Sep 24, 2025Updated 7 months ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆454Nov 3, 2025Updated 6 months ago
- Translate virtual addresses to physical addresses from usermode.☆123Jun 7, 2024Updated last year
- ☆97Jan 21, 2025Updated last year
- about how to make a anti-virus engine☆109May 22, 2025Updated 11 months ago
- ☆281Sep 2, 2025Updated 8 months ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆110Jan 18, 2026Updated 3 months ago
- "Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), and more.☆120Mar 16, 2026Updated last month