zodi4cx / OpenSesameLinks
A bootkit to bypass Windows login (WIP)
☆10Updated 2 years ago
Alternatives and similar repositories for OpenSesame
Users that are interested in OpenSesame are comparing it to the libraries listed below
Sorting:
- A minimalistic logger for Windows Kernel Drivers.☆25Updated last year
- Hardware Spoofing & VirtualBox-Hardening x64 Bootkit☆18Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Updated 3 years ago
- Enumerate Callbacks and all Object Types☆16Updated 3 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆41Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆38Updated 2 years ago
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆12Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆52Updated 3 years ago
- PDB Rewriting Rust Library☆26Updated last year
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 3 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆109Updated 3 weeks ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago
- Compact MBR Bootkit for Windows☆52Updated 4 years ago
- a windows kernel keylogger that works☆20Updated last year
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Updated last year
- Signature finder (from PE-bear)☆39Updated 5 months ago
- Elevate arbitrary MSR writes to kernel execution.☆44Updated 2 years ago
- Windows Minidump loader for Ghidra☆29Updated 3 years ago
- An example of how to use Microsoft Windows Warbird technology☆91Updated 2 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆48Updated 3 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- IDA plugin to recover source code from panic information on rust☆17Updated 9 months ago
- ☆22Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Updated last year
- Intel 64/Windows low-level experiments☆63Updated 5 months ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Updated 2 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated last year
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆30Updated 4 years ago