xplshn / hidefsLinks
Kernel module that allows hiding files in any filesystem
☆23Updated last year
Alternatives and similar repositories for hidefs
Users that are interested in hidefs are comparing it to the libraries listed below
Sorting:
- A simple UEFI bootkit made by @NSG650 and me.☆26Updated last year
- Intel 64/Windows low-level experiments☆63Updated 5 months ago
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Updated 11 months ago
- ☆25Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- A slightly more fun way to disable windows defender☆52Updated 9 months ago
- Finding Truth in the Shadows☆120Updated 3 years ago
- A universal binary patching dll.☆117Updated last year
- using the gpu to hide your payload☆63Updated 3 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Updated 7 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆150Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Updated 5 months ago
- Report and exploit of CVE-2023-36427☆90Updated 2 years ago
- Decrypting yandex browser passwords☆27Updated 10 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆245Updated 4 months ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆109Updated 3 weeks ago
- Virtual Trust Level (VTL 1) secure call tracing☆86Updated 5 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆41Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- curiosity got me here☆45Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Generate a proxy dll for arbitrary dll☆220Updated last year
- Exploit POC for CVE-2024-36877☆48Updated last year
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- kASLR bypass technique on Intel CPUs.☆32Updated 8 months ago
- ☆60Updated 3 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Updated 2 years ago
- Attacking the cleanup_module function of a kernel module☆56Updated 7 months ago
- An example of how to use Microsoft Windows Warbird technology☆91Updated 2 years ago
- ☆44Updated 2 years ago