0xAlexei / WindowsDefenderToolsLinks
Tools for instrumenting Windows Defender's mpengine.dll
☆308Updated 7 years ago
Alternatives and similar repositories for WindowsDefenderTools
Users that are interested in WindowsDefenderTools are comparing it to the libraries listed below
Sorting:
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆333Updated last year
- ☆234Updated 8 years ago
- Windows Kernel Drivers fuzzer☆376Updated 8 years ago
- Idapython script to carve binary for internal RPC structures☆239Updated last year
- Dump of win32k POCs for bugs I've found☆382Updated 3 years ago
- ☆407Updated 8 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆228Updated 2 years ago
- Extract Windows Defender database from vdm files and unpack it☆472Updated 5 months ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆283Updated 5 years ago
- Windows RPC Python fuzzer☆164Updated 8 years ago
- Driver Initial Reconnaissance Tool☆125Updated 6 years ago
- POC for cve-2019-1458☆177Updated 3 years ago
- ☆129Updated 5 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆237Updated 5 years ago
- Demos of various (also non standard) persistence methods used by malware☆223Updated 2 years ago
- Process Doppelgänging☆162Updated 8 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Updated 7 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆213Updated 5 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆413Updated 6 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆199Updated 6 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆624Updated 8 years ago
- awesome-windows-security-development☆176Updated 7 years ago
- Research on Windows Kernel Executive Callback Objects☆313Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Updated 4 years ago
- Recon 2015 Presentation from Alex Ionescu☆249Updated 9 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Updated 6 years ago
- Simple 32/64-bit PEs loader.☆138Updated 7 years ago
- ☆116Updated 9 years ago