{"id":19075249,"url":"https://github.com/0xvpr/offensive-kernel-mode-c","last_synced_at":"2025-02-22T04:42:33.553Z","repository":{"id":170577124,"uuid":"646742322","full_name":"0xvpr/offensive-kernel-mode-c","owner":"0xvpr","description":"A dedicated repository for exploring offensive kernel-mode techniques.","archived":false,"fork":false,"pushed_at":"2023-05-29T08:48:06.000Z","size":5,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-01-02T17:50:05.931Z","etag":null,"topics":["hacking","malware-research","ntapi","offensive-security","windows","windows-kernel"],"latest_commit_sha":null,"homepage":"","language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/0xvpr.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-05-29T08:34:33.000Z","updated_at":"2023-09-26T03:33:28.000Z","dependencies_parsed_at":null,"dependency_job_id":"e341223f-9099-40fa-b3cc-9e29fce6114f","html_url":"https://github.com/0xvpr/offensive-kernel-mode-c","commit_stats":null,"previous_names":["0xvpr/offensive-kernel-mode-c"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xvpr%2Foffensive-kernel-mode-c","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xvpr%2Foffensive-kernel-mode-c/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xvpr%2Foffensive-kernel-mode-c/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xvpr%2Foffensive-kernel-mode-c/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/0xvpr","download_url":"https://codeload.github.com/0xvpr/offensive-kernel-mode-c/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":240127086,"owners_count":19751938,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["hacking","malware-research","ntapi","offensive-security","windows","windows-kernel"],"created_at":"2024-11-09T01:54:07.583Z","updated_at":"2025-02-22T04:42:33.548Z","avatar_url":"https://github.com/0xvpr.png","language":"C","readme":"# Offensive C (Kernel Mode)\nThis repository is dedicated to provide examples for how to  \ninterface kernel-mode calls from user-land.\n\n## Examples\n|Name|Description|\n|----|-----------|\n|[Allocate \u0026 Execute Memory](01-allocate-and-execute)|An example of how to load and utilize NtVirtualAllocate/Write/Protect/Free functions and execute shellcode|\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F0xvpr%2Foffensive-kernel-mode-c","html_url":"https://awesome.ecosyste.ms/projects/github.com%2F0xvpr%2Foffensive-kernel-mode-c","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F0xvpr%2Foffensive-kernel-mode-c/lists"}