zodiacon / NativePowers
Native Powers Talk demos
☆14Updated last year
Alternatives and similar repositories for NativePowers:
Users that are interested in NativePowers are comparing it to the libraries listed below
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 9 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Enabled / Disable LSA Protection via BYOVD☆68Updated 3 years ago
- A VMWare logger using built-in backdoor.☆29Updated 6 months ago
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 8 months ago
- API Hammering with C++20☆46Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆62Updated last month
- In-memory hiding technique☆50Updated 4 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆75Updated last week
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 8 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated last month
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆70Updated 5 months ago
- ☆25Updated 2 years ago
- Example of building an application verifer DLL☆46Updated 11 months ago
- ☆29Updated last year
- Mentally ill EtwTi parser☆36Updated last month
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆62Updated 3 weeks ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 4 months ago
- Finding Truth in the Shadows☆92Updated 2 years ago
- Youtube channel sample code☆49Updated last week
- An example of how to use Microsoft Windows Warbird technology☆27Updated 2 years ago
- using the gpu to hide your payload☆57Updated 2 years ago
- Next gen process injection technique☆52Updated 4 years ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆11Updated 5 months ago
- ☆84Updated 11 months ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆13Updated 6 months ago
- Safe Rust bindings for the COM interfaces of the Windows debugging engine☆14Updated last week