Stars
Windows Kernel Programming (Обзорный перевод книги)
Samples for the book Windows Kernel Programming, 2nd edition
🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
PoCs for Kernelmode rootkit techniques research.
Filter driver that hides files on NTFS / Windows operating systems. Created for educational purposes only.
KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys
load unsigned kernel-driver by patching dse in 248 lines
Enumerating and removing kernel callbacks using signed vulnerable drivers
A post exploitation utility for loading signed kernel drivers using both the undocumented NtLoadDriver function and by directly interfacing with the Windows Service Control Manager (SCM)
Tool to bypass LSA Protection (aka Protected Process Light)
A PoC tool for exploiting leaked process and thread handles
"Screwed Drivers" centralized information source for code references, links, etc.
clubby789 / ExploitCapcom
Forked from tandasat/ExploitCapcomThis is a standalone exploit for a vulnerable feature in Capcom.sys
Project management software developed by MVC architectural pattern using: Python - Backend, tkinter - Frontend and Figma - UI design
Rental Agency System is a complete GUI based desktop application that deal with the user work in a rental agency. It save the data of all the houses, apartment and their corssponding detail in the …
This is an example Client server implementation I came across from Microsoft
Collection of Cyber Threat Intelligence sources from the deep and dark web