0vercl0k / kdmp-parser-rs
A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.
☆33Updated last month
Related projects: ⓘ
- Report and exploit of CVE-2024-21305.☆29Updated 8 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆33Updated 9 months ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆35Updated this week
- Helper idapython code for reversing kmdf drivers☆68Updated 2 years ago
- ☆44Updated 4 years ago
- ☆17Updated last year
- Command like tool to print mitigation flags for running processes in a memory dump☆41Updated 4 years ago
- Here I store my proof of concepts☆12Updated last week
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆36Updated last month
- Inlay hints for hex-rays☆18Updated this week
- ☆27Updated this week
- javascript extension of windbg for hacker.☆14Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆46Updated last year
- A minimalistic logger for Windows Kernel Drivers.☆20Updated 6 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆32Updated 2 months ago
- Playing with LLVM passes☆34Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆84Updated last month
- Windows KASLR bypass using prefetch side-channel☆64Updated 4 months ago
- A simple but useful project maybe help you reverse Windows.☆26Updated 5 months ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆35Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆28Updated last year
- ☆23Updated 9 months ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆29Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆27Updated last year
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆45Updated 2 years ago
- Rust bindings for VMProtect.☆23Updated 6 months ago
- Enabled / Disable LSA Protection via BYOVD☆61Updated 2 years ago
- Different tools for Microsoft Hyper-V researching☆45Updated 3 months ago
- ☆30Updated last year