AaLl86 / WindowsInternals
Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book
☆108Updated 10 months ago
Alternatives and similar repositories for WindowsInternals:
Users that are interested in WindowsInternals are comparing it to the libraries listed below
- ☆73Updated 10 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- Recon 2023 slides and code☆79Updated last year
- Different tools for Microsoft Hyper-V researching☆57Updated 11 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆152Updated 2 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆117Updated 6 months ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- ☆71Updated 2 years ago
- Windows KASLR bypass using prefetch side-channel☆92Updated last year
- ☆89Updated 2 months ago
- ☆143Updated last year
- Finding Truth in the Shadows☆92Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆83Updated 4 years ago
- ☆45Updated last month
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆80Updated 6 months ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆121Updated 2 months ago
- ☆145Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆92Updated 6 months ago
- An x64dbg plugin which marks XFG call signatures as data☆74Updated last year
- Writeups for CTF challenges☆31Updated last year
- ☆18Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- Report and exploit of CVE-2024-21305.☆34Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆53Updated this week
- ☆97Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆100Updated last year
- Example of building an application verifer DLL☆46Updated 11 months ago