0xAlexei / WindowsDefenderTools
Tools for instrumenting Windows Defender's mpengine.dll
☆288Updated 6 years ago
Alternatives and similar repositories for WindowsDefenderTools:
Users that are interested in WindowsDefenderTools are comparing it to the libraries listed below
- ☆231Updated 7 years ago
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆312Updated 9 months ago
- Research on Windows Kernel Executive Callback Objects☆282Updated 4 years ago
- Windows Kernel Drivers fuzzer☆302Updated 7 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆425Updated 6 years ago
- Extract Windows Defender database from vdm files and unpack it☆433Updated 4 years ago
- FLARE Kernel Shellcode Loader☆176Updated 5 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆217Updated last year
- Examples of leaking Kernel Mode information from User Mode on Windows☆585Updated 7 years ago
- Process Doppelgänging☆155Updated 7 years ago
- Recon 2015 Presentation from Alex Ionescu☆234Updated 8 years ago
- ☆396Updated 7 years ago
- Dump of win32k POCs for bugs I've found☆372Updated 2 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆269Updated 4 years ago
- Hyper-V Research is trendy now☆176Updated 8 months ago
- Driver Initial Reconnaissance Tool☆121Updated 5 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆232Updated 4 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆212Updated 5 years ago
- Windows RPC Python fuzzer☆159Updated 7 years ago
- ☆107Updated 4 years ago
- Demos of various (also non standard) persistence methods used by malware☆219Updated last year
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆180Updated 4 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆194Updated 5 years ago
- Process Hollowing for 32 bit and 64 bit☆80Updated 7 years ago
- awesome-windows-security-development☆170Updated 6 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆220Updated 4 years ago
- Reverse engineered source code of the autochk rootkit☆199Updated 5 years ago
- Quickly debug shellcode extracted during malware analysis☆575Updated last year
- My repository to upload drivers from different books and all the information related to windows internals.☆154Updated 5 years ago
- POC for cve-2019-1458☆172Updated 3 years ago