AaLl86 / WindowsInternalsLinks
Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book
☆113Updated last year
Alternatives and similar repositories for WindowsInternals
Users that are interested in WindowsInternals are comparing it to the libraries listed below
Sorting:
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated last month
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆124Updated last week
- Different tools for Microsoft Hyper-V researching☆61Updated 3 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 8 months ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆85Updated 5 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- Report and exploit of CVE-2023-36427☆88Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆96Updated 4 months ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆93Updated 3 years ago
- ☆74Updated last year
- Report and exploit of CVE-2024-21305.☆38Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 7 months ago
- Windows KASLR bypass using prefetch side-channel☆131Updated last year
- ☆147Updated 2 years ago
- ☆90Updated 8 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆80Updated last month
- ☆71Updated 2 years ago
- ☆60Updated 8 months ago
- dynamic binary instrumentation, analysis, and patching framework☆95Updated last month
- ☆83Updated 2 months ago
- Hyper-V related resources☆31Updated last year
- Windows kernel PDB data parsed into YAML☆41Updated 11 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- ☆147Updated last year
- Recon 2023 slides and code☆80Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 10 months ago
- A post-processing script for TinyTracer☆36Updated 2 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆53Updated last month