whokilleddb / HelloWorldDriverLinks
Get started with writing your first ever Windows Driver
☆34Updated last year
Alternatives and similar repositories for HelloWorldDriver
Users that are interested in HelloWorldDriver are comparing it to the libraries listed below
Sorting:
- ☆120Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated last month
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Situational Awareness script to identify how and where to run implants☆62Updated 8 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- ☆84Updated 3 years ago
- Utilities for obfuscating shellcode☆90Updated 5 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆21Updated 8 months ago
- IAT Unhooking proof-of-concept☆30Updated last year
- Make an Linux Kernel rootkit visible again.☆55Updated 6 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆68Updated 3 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- ☆33Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- ☆108Updated 10 months ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆108Updated last year
- CSharp4Pentesters☆12Updated 3 years ago
- ☆58Updated 4 months ago
- ☆10Updated 2 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- ☆38Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- Recon 2023 slides and code☆79Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year