| bcoles/kasld |
324 |
|
0 |
0 |
about 2 years ago |
0 |
|
0 |
mit |
C |
| Kernel Address Space Layout Derandomization [ KASLD ] - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR). |
| VenTaz/Themidie |
151 |
|
0 |
0 |
almost 5 years ago |
0 |
|
0 |
|
C |
| x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (x64) |
| Cn33liz/HSEVD-StackOverflowX64 |
57 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
|
C |
| HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass |
| allogic/KDBG |
51 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
gpl-3.0 |
C++ |
| The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI; the command line interface for the driver. It originated due to insufficient useability with CheatEngine's DBVM driver while debugging games running under certain AntiCheat software. |
| 0xyg3n/PEx64-Injector |
49 |
|
0 |
0 |
about 5 years ago |
0 |
|
0 |
|
C# |
| Inject your x64 bit executable to any process, masking it as a legitimate process for Anti-Virus evasion. |
| w4fz5uck5/LonelyALPC-BypassUAC |
25 |
|
0 |
0 |
almost 3 years ago |
0 |
|
0 |
|
C |
| Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line] |
| zc149352394/xigncode-bypass-standalone |
9 |
|
0 |
0 |
almost 6 years ago |
0 |
|
0 |
|
JavaScript |
| Tera Online 绕过系统反外挂(xigncode3)检测 - 独立运行版 |
| fullmetalcache/RunSharp |
5 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
mit |
C# |
| Simple program that allows you to run commands as another user without being prompted for their password. This is useful in cases where you don't always get feedback from a prompt, such as the case with some remote shells. |