0vercl0k / symbolizer-rs
A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.
☆91Updated 6 months ago
Alternatives and similar repositories for symbolizer-rs:
Users that are interested in symbolizer-rs are comparing it to the libraries listed below
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆116Updated 5 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆72Updated 2 months ago
- ☆145Updated last year
- ☆68Updated 2 years ago
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆34Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆89Updated 11 months ago
- This repo contains EXPs about Vulnerable Windows Driver☆39Updated 11 months ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 11 months ago
- ☆83Updated 10 months ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- Rust symbol recovery tool☆47Updated last month
- Report and exploit of CVE-2024-21305.☆34Updated last year
- ☆32Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆63Updated last year
- PyKD DLLs for x86 and x64 platforms☆17Updated last year
- LPE exploit for CVE-2023-36802☆22Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆136Updated 8 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆24Updated 2 years ago
- A simple but useful project maybe help you reverse Windows.☆36Updated last year
- ☆73Updated 9 months ago
- Remove WPP calls from hexrays decompiled code☆45Updated 3 weeks ago
- Writeups for CTF challenges☆31Updated last year
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆44Updated last week
- A few examples of how to trap virtual memory access on Windows.☆29Updated 4 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆123Updated last month
- Abusing exceptions for code execution.☆110Updated 2 years ago