zodi4cx / OpenSesameLinks
A bootkit to bypass Windows login (WIP)
☆11Updated last year
Alternatives and similar repositories for OpenSesame
Users that are interested in OpenSesame are comparing it to the libraries listed below
Sorting:
- A VMWare logger using built-in backdoor.☆29Updated 11 months ago
- Hardware Spoofing & VirtualBox-Hardening x64 Bootkit☆18Updated 2 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 2 years ago
- PDB Rewriting Rust Library☆25Updated last year
- An xtask to speed up Windows kernel driver development in rust.☆19Updated last year
- A minimalistic logger for Windows Kernel Drivers.☆25Updated last year
- IDA plugin to recover source code from panic information on rust☆17Updated 4 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆36Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆31Updated 3 years ago
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆21Updated last year
- Example of building an application verifer DLL☆49Updated last year
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- a windows kernel keylogger that works☆20Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆48Updated 3 weeks ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- ☆22Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆73Updated 2 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆47Updated 2 years ago
- The program is intended for a dynamic unpacking of binders, crypters, packers and protectors☆11Updated 5 years ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 2 months ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆24Updated last year
- Report and exploit of CVE-2024-21305.☆38Updated last year
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆35Updated last year
- SetWinEventHook Sample☆49Updated 2 years ago
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- Windows Minidump loader for Ghidra☆29Updated 3 years ago
- Enumerate Callbacks and all Object Types☆13Updated 2 years ago
- Lightweight Threat Detection System - (Base)☆15Updated last year