55-AA / fetch_syscallsLinks
An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.
☆12Updated 8 years ago
Alternatives and similar repositories for fetch_syscalls
Users that are interested in fetch_syscalls are comparing it to the libraries listed below
Sorting:
- CVE-2014-0816☆25Updated 8 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- ☆28Updated 8 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Updated 13 years ago
- ☆22Updated 8 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 8 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applications☆36Updated 12 years ago
- Crappy Win32k syscall fuzzer☆13Updated 10 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 11 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 12 years ago
- Just another tool to download specify Symbol (.pdb) files☆38Updated 5 years ago
- reversed emet tool☆24Updated 12 years ago
- ☆18Updated 8 years ago
- Tool to resolve symbols by the address of the binary☆15Updated 6 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- ☆15Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- ☆10Updated 7 years ago