0vercl0k / lockmemLinks
This utility allows you to lock every available memory regions of an arbitrary process into its working set.
☆69Updated 2 years ago
Alternatives and similar repositories for lockmem
Users that are interested in lockmem are comparing it to the libraries listed below
Sorting:
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- ☆49Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- ☆41Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 5 years ago
- clone of armadillo patched for windows☆48Updated last year
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆74Updated 2 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Updated 5 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆72Updated 6 years ago
- ☆12Updated 3 years ago
- ☆148Updated 2 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- PyKD DLLs for x86 and x64 platforms☆17Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Different tools for Microsoft Hyper-V researching☆63Updated this week
- This is a place to share my miscellaneous projects.☆116Updated 5 years ago
- ☆24Updated 4 years ago
- windbg plugin for win32k debugging☆75Updated 6 years ago
- IDA script for vmprotect Windows Api address decoder☆52Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 5 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆61Updated 2 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Updated 4 years ago
- ☆164Updated 4 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers…☆71Updated 4 years ago
- Hyper-V related resources☆31Updated last year
- ☆41Updated 5 years ago
- ☆59Updated 3 years ago