KiFilterFiberContext/warbird-hook

Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard

C++Assemblypatchguardmicrosoft-warbird
This is stars and forks stats for /KiFilterFiberContext/warbird-hook repository. As of 29 Apr, 2024 this repository has 198 stars and 27 forks.

Warbird Hook On Windows 10 21H2, ntoskrnl.exe contains a table of pointers named g_kernelCallbacks used for licensing checks (called from nt!SPCall2ServerInternal). The callback table contains pointers to functions in an image named ClipSp.sys, which is a signed driver protected by Microsoft Warbird . The interesting thing about it is that PatchGuard does not verify the integrity of several image sections, including PAGEwx, which the driver contains in order to decrypt and re-encrypt its own code...
Read on GithubGithub Stats Page
repotechsstarsweeklyforksweekly
Limingrui0/Luogu_answersC++Other1340290
bit-mips/bitmips_experimentsCoqAssemblyVerilog30090
D-Programming-Deimos/NanopbDC++C2030
brash99/Cpsc256MakefileC++C60440
0vercl0k/paracosmePythonC++C820210
THU-DSP-LAB/ventus-gpgpuScalaTclVerilog3110410
thesourcerer8/hddsupercloneCHTMLC++3480310
eladshamir/RPC-BackdoorCC++C#1890430
vmware/open-vm-toolsCC++Makefile2.1k04140
daem0nc0re/TangledWinExecC#C++C76901280