whokilleddb / HelloWorldDriver
Get started with writing your first ever Windows Driver
☆29Updated last year
Related projects ⓘ
Alternatives and complementary repositories for HelloWorldDriver
- BSides Prishtina 2024 Malware Development and Persistence workshop☆58Updated 3 weeks ago
- A small red team course☆32Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- IAT Unhooking proof-of-concept☆28Updated 7 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆79Updated 9 months ago
- ☆58Updated 11 months ago
- malleable profile generator GUI for Havoc☆56Updated last year
- Utilities for obfuscating shellcode☆45Updated 4 months ago
- A collection of PoCs for different injection techniques on Windows!☆42Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆24Updated 4 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆82Updated 7 months ago
- ☆24Updated last week
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- ☆68Updated last year
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆51Updated last month
- This map lists the essential techniques to bypass anti-virus and EDR☆14Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 6 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- ☆20Updated 11 months ago
- ☆9Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated 9 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆73Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 6 months ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆14Updated 8 months ago
- ☆36Updated 7 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago