xmmword / x0Links
Hardware Spoofing & VirtualBox-Hardening x64 Bootkit
☆16Updated 2 years ago
Alternatives and similar repositories for x0
Users that are interested in x0 are comparing it to the libraries listed below
Sorting:
- XOrCryptEx lightweight C Utility/Algorithm☆12Updated 3 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- ☆11Updated 3 years ago
- A VMWare logger using built-in backdoor.☆30Updated 10 months ago
- ☆25Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated 10 months ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 3 years ago
- ☆16Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Windows Minidump loader for Ghidra☆29Updated 2 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆16Updated 3 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated 2 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Load Dll into Kernel space☆38Updated 3 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆31Updated 3 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Updated last year
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆23Updated 3 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆11Updated 2 years ago
- kASLR bypass technique on Intel CPUs.☆24Updated 3 months ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆30Updated 3 weeks ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 3 years ago