0vercl0k / kdmp-parser-rs
A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.
☆34Updated 2 months ago
Alternatives and similar repositories for kdmp-parser-rs:
Users that are interested in kdmp-parser-rs are comparing it to the libraries listed below
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- Report and exploit of CVE-2024-21305.☆34Updated last year
- A VMWare logger using built-in backdoor.☆29Updated 6 months ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆44Updated this week
- A minimalistic logger for Windows Kernel Drivers.☆22Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆91Updated 6 months ago
- Cargo subcommand to build a crate into shellcode☆24Updated 8 months ago
- Rust bindings for VMProtect.☆25Updated last year
- ☆23Updated last year
- ☆45Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆53Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- PDB Rewriting Rust Library☆23Updated 11 months ago
- Rust library for lifting raw binary data to LLVM IR☆47Updated last week
- Generate a PDB file given the old PDB file and an address mapping☆44Updated last month
- Remove WPP calls from hexrays decompiled code☆45Updated 2 weeks ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆34Updated 3 years ago
- Different tools for Microsoft Hyper-V researching☆52Updated 10 months ago
- A few examples of how to trap virtual memory access on Windows.☆29Updated 4 months ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆45Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆26Updated 2 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆22Updated 2 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆27Updated 2 weeks ago
- Finding Truth in the Shadows☆89Updated 2 years ago
- ☆20Updated 3 months ago
- ☆17Updated 2 months ago