A repository providing practical examples for interfacing kernel-mode calls from user-land in C.
A dedicated repository for exploring offensive kernel-mode techniques.
This tool is designed for security researchers and red teamers who want to understand and demonstrate offensive kernel-mode techniques by interacting with kernel functions from user space. It is particularly useful for learning how to allocate, write, protect, and execute memory in kernel mode to run shellcode.
This repository serves as an educational example and does not provide automated tooling or installation scripts. Users should have a strong understanding of kernel-mode programming and security implications before using or modifying the examples.
01-allocate-and-execute
Example demonstrating how to allocate memory, write shellcode, change memory protection, and execute shellcode using kernel-mode calls.