https://github.com/0xvpr/offensive-kernel-mode-c
A dedicated repository for exploring offensive kernel-mode techniques.
https://github.com/0xvpr/offensive-kernel-mode-c
hacking malware-research ntapi offensive-security windows windows-kernel
Last synced: 12 months ago
JSON representation
A dedicated repository for exploring offensive kernel-mode techniques.
- Host: GitHub
- URL: https://github.com/0xvpr/offensive-kernel-mode-c
- Owner: 0xvpr
- License: mit
- Created: 2023-05-29T08:34:33.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-05-29T08:48:06.000Z (over 2 years ago)
- Last Synced: 2025-01-02T17:50:05.931Z (about 1 year ago)
- Topics: hacking, malware-research, ntapi, offensive-security, windows, windows-kernel
- Language: C
- Homepage:
- Size: 4.88 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Offensive C (Kernel Mode)
This repository is dedicated to provide examples for how to
interface kernel-mode calls from user-land.
## Examples
|Name|Description|
|----|-----------|
|[Allocate & Execute Memory](01-allocate-and-execute)|An example of how to load and utilize NtVirtualAllocate/Write/Protect/Free functions and execute shellcode|