whokilleddb / BoosterDriverLinks
A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.
☆15Updated last year
Alternatives and similar repositories for BoosterDriver
Users that are interested in BoosterDriver are comparing it to the libraries listed below
Sorting:
- Manually perform syscalls without going through any external API or DLL.☆18Updated 2 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆11Updated 6 months ago
- ☆26Updated 3 months ago
- ☆18Updated last year
- really ?☆12Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆20Updated 2 months ago
- ☆25Updated 2 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- ☆40Updated 3 months ago
- ☆20Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated last month
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 11 months ago
- Signature finder (from PE-bear)☆36Updated last month
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆29Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated 2 years ago
- ☆21Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆33Updated 3 years ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆31Updated 11 months ago
- Self delete DLL (2)☆14Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)