0vercl0k / clairvoyance
Visualize the virtual address space of a Windows process on a Hilbert curve.
☆299Updated 3 years ago
Alternatives and similar repositories for clairvoyance:
Users that are interested in clairvoyance are comparing it to the libraries listed below
- A hypervisor for fuzzing built with WHVP and Bochs☆371Updated 6 years ago
- Snapshot-based coverage-guided windows kernel fuzzer☆317Updated 3 years ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆245Updated 7 years ago
- Integrate Ghidra's decompiler as an Ida plugin☆426Updated 9 months ago
- Have fun with the LowFragmentationHeap☆235Updated 4 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆292Updated 2 years ago
- A bunch of JavaScript extensions for WinDbg.☆329Updated 3 months ago
- A differential fuzzer for x86 decoders☆244Updated 4 months ago
- Binary coverage tool without binary modification for Windows☆434Updated 4 years ago
- The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by W…☆377Updated last year
- A collection of LLVM transform and analysis passes to write shellcode in regular C☆370Updated last year
- Dump of win32k POCs for bugs I've found☆371Updated 3 years ago
- Opcode calculator / ASM calculator☆379Updated this week
- Ghidra Extension to integrate BinDiff for function matching☆263Updated 3 weeks ago
- Time Travel Debugging IDA plugin☆571Updated 8 months ago
- ☆105Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆401Updated 4 years ago
- Yet Another Ghidra Integration for IDA☆499Updated 6 months ago
- Internals information about Hyper-V☆685Updated 2 months ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆216Updated 4 years ago
- Toy scripts for playing with WinDbg JS API☆223Updated 8 months ago
- Binary code coverage visualizer plugin for Ghidra☆289Updated 8 months ago
- The history of Windows Internals via symbols.☆177Updated 3 years ago
- Research on Windows Kernel Executive Callback Objects☆284Updated 5 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆334Updated 5 years ago
- Supporting Data Archives for Ghidra☆262Updated 4 years ago
- Injects code into ELF executables post-build☆227Updated 9 months ago
- Bindings for Microsoft WinDBG TTD☆216Updated last year
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆300Updated 3 months ago
- abyss - augmentation of Hexrays decompiler output☆337Updated 2 years ago