Get started with writing your first ever Windows Driver
☆35Nov 4, 2023Updated 2 years ago
Alternatives and similar repositories for HelloWorldDriver
Users that are interested in HelloWorldDriver are comparing it to the libraries listed below
Sorting:
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Detect and extract hidden files☆22Aug 29, 2024Updated last year
- ☆19Sep 17, 2025Updated 5 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 7 months ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆24Jan 26, 2026Updated last month
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Shh0ya Kernel Hook Driver☆25Dec 8, 2020Updated 5 years ago
- x64dbg python3 plugin☆32Jan 4, 2026Updated last month
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Aug 8, 2023Updated 2 years ago
- ☆24Feb 1, 2025Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Cheat sheet of binary protections flags☆24Sep 6, 2020Updated 5 years ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Collection of Rust repos useful for Red Teamers.☆34Sep 23, 2022Updated 3 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆436May 22, 2025Updated 9 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Simple API Hooks detector☆77Aug 22, 2022Updated 3 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆137Sep 20, 2025Updated 5 months ago
- ☆12Updated this week
- A small How-To on creating your own weaponized WSL file☆121Jul 23, 2025Updated 7 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Apr 11, 2025Updated 10 months ago
- ☆74Feb 16, 2026Updated 2 weeks ago
- Knowledge Management for Offensive Security Professionals Official Repository☆151Feb 25, 2025Updated last year
- ☆36Feb 14, 2023Updated 3 years ago
- A post-processing script for TinyTracer☆39Mar 22, 2023Updated 2 years ago
- Transfer waveforms from Tektronix Oscilloscopes using the High-Speed Interface☆12Updated this week
- A set of guides to help students working on programming projects☆10Apr 24, 2025Updated 10 months ago
- ☆10Oct 9, 2024Updated last year
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- Mirage is a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆104Feb 25, 2025Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆272Oct 31, 2024Updated last year
- Malware development for red teaming workshop☆225Nov 15, 2021Updated 4 years ago