whokilleddb / HelloWorldDriver
Get started with writing your first ever Windows Driver
☆30Updated last year
Alternatives and similar repositories for HelloWorldDriver:
Users that are interested in HelloWorldDriver are comparing it to the libraries listed below
- IAT Unhooking proof-of-concept☆29Updated 11 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆81Updated last year
- Detect userland hooks placed by AV/EDR☆27Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- Situational Awareness script to identify how and where to run implants☆45Updated 3 months ago
- ☆33Updated last week
- ☆35Updated 2 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 9 months ago
- A small red team course☆35Updated last year
- ☆33Updated 2 years ago
- ☆36Updated last year
- ☆58Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆36Updated 4 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆66Updated 4 months ago
- quASAR: ASAR manipulation made easy☆25Updated 2 years ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 10 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- A pure C version of SymProcAddress☆25Updated 11 months ago
- malleable profile generator GUI for Havoc☆56Updated last year
- Offensive Assembly code snippets.☆12Updated last year
- CSharp4Pentesters☆12Updated 3 years ago
- ☆37Updated this week
- ☆53Updated 4 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆13Updated 2 months ago