zorftw / kdmapper-rsLinks
Rust port of kdmapper
☆21Updated 3 years ago
Alternatives and similar repositories for kdmapper-rs
Users that are interested in kdmapper-rs are comparing it to the libraries listed below
Sorting:
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Updated 3 years ago
- Rust bindings for VMProtect.☆26Updated last year
- Minimalistic Windows Kernel Allocator.☆49Updated 11 months ago
- ☆47Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆58Updated last year
- Reflective DLL self-loading as a library☆21Updated 3 months ago
- Rust implementation of lazy_importer☆56Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆79Updated last year
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆46Updated 2 months ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Updated 7 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆66Updated 2 years ago
- Finding Truth in the Shadows☆110Updated 2 years ago
- An example of Windows self-replicating malware.☆11Updated 2 years ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆70Updated 4 months ago
- A minimalistic logger for Windows Kernel Drivers.☆24Updated last year
- A VMWare logger using built-in backdoor.☆30Updated 9 months ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated last year
- Example of building an application verifer DLL☆51Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year
- Enumerate Callbacks and all Object Types☆13Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 3 years ago
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆15Updated 4 months ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆31Updated 2 years ago
- windows rootkit☆61Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆36Updated 2 years ago
- Load dll with undocumented functions and debug symbols☆47Updated last year
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆65Updated 11 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆88Updated 4 months ago
- ☆114Updated 3 years ago