8000 lw8192 / Starred · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View lw8192's full-sized avatar

Block or report lw8192

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Simple Kernelmode DLL Injector with Manual mapping

C++ 285 42 Updated Nov 29, 2023

Like VulnServer, but kernel-mode.

Python 5 Updated May 16, 2025

A library to develop kernel level Windows payloads for post HVCI era

C++ 407 77 Updated May 18, 2021

A Collection of In-Memory Shellcode Execution Techniques for Windows

C 148 38 Updated Jul 26, 2019

HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion

C++ 52 10 Updated Apr 22, 2025

MCP Server for Ghidra

Java 4,809 332 Updated Apr 22, 2025

Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.

C++ 330 62 Updated Aug 8, 2021

kernel callback removal (Bypassing EDR Detections)

C++ 162 31 Updated Mar 21, 2025

A DLL loader with advanced evasive features

C 718 91 Updated Feb 26, 2023

Windows x64 Exploitation Training

Python 15 2 Updated Apr 17, 2025

Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executable pages. (VAD hide / NX bit swapping)

C 325 89 Updated Jan 29, 2022

This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.

26 5 Updated Nov 29, 2022

Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.

Python 43 6 Updated Oct 23, 2024

Shellcode obfuscation tool to avoid AV/EDR.

C++ 127 17 Updated Sep 1, 2023

Hook system calls on Windows by using Kaspersky's hypervisor

C++ 2 Updated Nov 3, 2022

Open Source EDR for Windows

Go 1,241 148 Updated Feb 25, 2023

Bypassing antivirus detection: old-school malware, new tricks

C++ 61 9 Updated May 10, 2023

Project page for "The Debugging Book"

Python 227 178 Updated Apr 13, 2025

This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Response (EDR) systems

54 10 Updated Oct 16, 2024

StoneKeeper C2, an experimental EDR evasion framework for research purposes

C++ 201 17 Updated Dec 25, 2024

DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forensics, Incident Response, Malware Analysis and Threat Hunting.

Python 205 19 Updated Feb 23, 2025

Proxy system calls over an RPC channel

C# 98 15 Updated Feb 11, 2022

HookChain: A new perspective for Bypassing EDR Solutions

C 533 89 Updated Jan 5, 2025

This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of code cleanup.

C++ 94 22 Updated Sep 18, 2024

Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)

Rust 262 33 Updated Aug 31, 2024

A collection of exploits and exercises developed while preparing for the eCXD exam!

Python 30 7 Updated Jan 14, 2023

Remote Thread Detection with a Kernel Driver

C++ 30 4 Updated Jan 14, 2025

Windows rootkit designed to work with BYOVD exploits

C++ 198 24 Updated Jan 18, 2025

Various public documents, whitepapers and articles about APT campaigns

3,576 881 Updated Jan 1, 2024
Next
0