zhuhuibeishadiao / ntoskrnl
The Windows Research Kernel (WRK)
☆174Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for ntoskrnl
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆232Updated 8 months ago
- Native code virtualizer for x64 binaries☆403Updated this week
- Load your driver like win32k.sys☆246Updated 2 years ago
- Collection of undocumented Windows API declarations.☆290Updated 3 weeks ago
- Debugger Anti-Detection Benchmark☆291Updated 11 months ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆226Updated 2 years ago
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆163Updated last week
- Windows inline hooking tool.☆228Updated 6 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆253Updated 2 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆140Updated last year
- Easy Anti PatchGuard☆214Updated 3 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆197Updated 3 years ago
- System call hook for Windows 10 20H1☆482Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆123Updated 2 years ago
- Kernel LdrLoadDll injector☆257Updated 6 years ago
- Simple Intel VT-x hypervisor☆267Updated 11 months ago
- A library to develop kernel level Windows payloads for post HVCI era☆366Updated 3 years ago
- ☆194Updated last year
- A modern c++ implementation of windows heavens gate☆194Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆171Updated last year
- A native hypervisor designed for the Windows operating system☆120Updated 3 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆142Updated 2 months ago
- DSE bypass using a leaked cert and adjusting the current clock.☆137Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆261Updated last month
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆268Updated last year
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆512Updated 3 weeks ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆239Updated 2 years ago
- Lightweight Intel VT-x Hypervisor.☆406Updated last year
- Yet another windows internals repo☆205Updated 3 years ago