A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers (CVE makers!)
☆71Nov 5, 2021Updated 4 years ago
Alternatives and similar repositories for DriverAnalyzer
Users that are interested in DriverAnalyzer are comparing it to the libraries listed below
Sorting:
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Open Course for diving security internal☆52Nov 11, 2019Updated 6 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- ☆13Feb 22, 2022Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Jul 8, 2021Updated 4 years ago
- fyyre.l2-fashion.de .. old site☆17Apr 27, 2022Updated 3 years ago
- Resolve DOS MZ executable symbols at runtime☆96Nov 12, 2021Updated 4 years ago
- ☆50Dec 19, 2023Updated 2 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆38Sep 27, 2015Updated 10 years ago
- Toolkit for Hyper-V security research☆157Mar 7, 2022Updated 3 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆100Jun 21, 2020Updated 5 years ago
- IDA scripts for hypervisor (Hyper-v) analysis and reverse engineering automation☆27Dec 7, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- haze binary fuzzer☆56May 19, 2024Updated last year
- Papers related with kernel papers☆13Mar 18, 2023Updated 2 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆14Apr 9, 2019Updated 6 years ago
- neat way to detect memory read using nt layer function.☆14Aug 4, 2023Updated 2 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.☆33Jul 8, 2025Updated 7 months ago
- Fuzzing library written in/for python.☆85Mar 25, 2020Updated 5 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- ☆14Jun 21, 2020Updated 5 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- Winnie makes fuzzing Windows applications easy☆572Nov 28, 2022Updated 3 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆191Aug 9, 2021Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtime☆45Mar 13, 2025Updated 11 months ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- An example fuzzer about how to fuzz a JS engine combinign Nautilus with Token-level fuzzing☆47Mar 5, 2024Updated last year