zodi4cx / OpenSesame
A bootkit to bypass Windows login (WIP)
☆10Updated last year
Alternatives and similar repositories for OpenSesame
Users that are interested in OpenSesame are comparing it to the libraries listed below
Sorting:
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- EDR PoC WIP LLC☆11Updated last year
- Lightweight Threat Detection System - (Base)☆14Updated last year
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago
- A VMWare logger using built-in backdoor.☆29Updated 7 months ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 2 years ago
- Rust version of the objdir tool☆13Updated last year
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆20Updated this week
- PDB Rewriting Rust Library☆24Updated last year
- IDA plugin to recover source code from panic information on rust☆13Updated last week
- An xtask to speed up Windows kernel driver development in rust.☆19Updated 10 months ago
- A minimalistic logger for Windows Kernel Drivers.☆23Updated last year
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Updated 3 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆19Updated last year
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆20Updated last year
- Me fockin' pe protector☆45Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- Example of building an application verifer DLL☆46Updated 11 months ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆34Updated last year
- Enumerate Callbacks and all Object Types☆13Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Hardware Spoofing & VirtualBox-Hardening x64 Bootkit☆16Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 9 months ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year