AmrThabet / winSRDFLinks
Security Research and Development Framework
☆106Updated 9 years ago
Alternatives and similar repositories for winSRDF
Users that are interested in winSRDF are comparing it to the libraries listed below
Sorting:
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆62Updated 7 years ago
- ☆115Updated 8 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆87Updated 8 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆73Updated 5 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- Load a Windows Kernel Driver☆92Updated 7 years ago
- Elevation of privilege detector based on HyperPlatform☆122Updated 8 years ago
- Windbg extension to find PatchGuard pages☆118Updated 10 years ago
- Tool to view and create Microsoft shim database files (SDB).☆114Updated 8 years ago
- A slightly stripped down version of RID (an exercise in learning python C-Types...some of it is a little rushed/sloppy) and a stripped do…☆51Updated 12 years ago
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆91Updated 6 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆71Updated 8 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆75Updated 10 years ago
- ☆91Updated 8 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 3 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆109Updated last year
- A tool to detect and crash Cuckoo Sandbox☆294Updated 10 months ago
- Simple library to spray the Windows Kernel Pool☆109Updated 5 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago
- Ruxcon2016 POC Code☆139Updated 8 years ago
- Rovnix Bootkit☆118Updated 10 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆96Updated 3 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆136Updated 8 years ago