Skip to content
View 0x00Check's full-sized avatar

Block or report 0x00Check

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. ExploitLeakedHandle ExploitLeakedHandle Public

    Identify and exploit leaked handles for local privilege escalation.

    C++ 111 16

  2. Amaterasu Amaterasu Public

    Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Process Explorer driver to kill a process's handles from kerne…

    C++ 78 22

  3. Find-UserlandHooks Find-UserlandHooks Public

    PowerShell script to find NTDLL functions that may be hooked by AV or EDR by comparing what exists on disk with the loaded ntdll module.

    PowerShell 10 2

  4. MS13-098 MS13-098 Public

    PowerShell script to append data to executables without invalidating their digital signature. (MS13-098)

    PowerShell 10

  5. PsSetCreateProcessNotifyRoutineEx PsSetCreateProcessNotifyRoutineEx Public

    Minimal driver that calls PsSetCreateProcessNotifyRoutineEx and writes basic process information to the kernel debugger. For educational purposes.

    C++ 5 3

  6. Get-SyscallID Get-SyscallID Public

    PowerShell script to retrieve the system call numbers for Nt/Zw functions exported in NTDLL.

    PowerShell 4 2