0xAlexei / WindowsDefenderToolsLinks
Tools for instrumenting Windows Defender's mpengine.dll
☆304Updated 7 years ago
Alternatives and similar repositories for WindowsDefenderTools
Users that are interested in WindowsDefenderTools are comparing it to the libraries listed below
Sorting:
- Windows Kernel Drivers fuzzer☆369Updated 8 years ago
- Dump of win32k POCs for bugs I've found☆380Updated 3 years ago
- Extract Windows Defender database from vdm files and unpack it☆466Updated 2 months ago
- Idapython script to carve binary for internal RPC structures☆239Updated last year
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆332Updated last year
- FLARE Kernel Shellcode Loader☆178Updated 6 years ago
- POC for cve-2019-1458☆177Updated 3 years ago
- Windows RPC Python fuzzer☆163Updated 7 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆278Updated 5 years ago
- ☆235Updated 8 years ago
- ☆122Updated 5 years ago
- awesome-windows-security-development☆173Updated 7 years ago
- ☆404Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Updated 7 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆198Updated 6 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Updated 5 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆159Updated 6 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆225Updated 2 years ago
- Toy scripts for playing with WinDbg JS API☆240Updated last year
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆211Updated 5 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆407Updated 5 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆237Updated 5 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆622Updated 8 years ago
- Process Doppelgänging☆161Updated 7 years ago
- Research on Windows Kernel Executive Callback Objects☆310Updated 5 years ago
- Hyper-V Research is trendy now☆189Updated last year
- Demos of various (also non standard) persistence methods used by malware☆221Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆97Updated 3 years ago
- Recon 2015 Presentation from Alex Ionescu☆247Updated 9 years ago