Cr4sh / ioctlfuzzerLinks
Automatically exported from code.google.com/p/ioctlfuzzer
☆168Updated 10 years ago
Alternatives and similar repositories for ioctlfuzzer
Users that are interested in ioctlfuzzer are comparing it to the libraries listed below
Sorting:
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆135Updated 9 years ago
- PEDA-like debugger UI for WinDbg☆205Updated last year
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- Windows RPC Python fuzzer☆163Updated 7 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆123Updated 6 years ago
- kernel pool windbg extension☆84Updated 10 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- Have fun with the LowFragmentationHeap☆242Updated 4 years ago
- ☆236Updated 7 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆339Updated 6 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆436Updated 7 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆306Updated 6 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Updated 8 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- ☆181Updated 6 years ago
- Any useful windbg plugins I've written.☆117Updated 7 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 11 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- Python scripts for reverse engineering.☆184Updated 4 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- CTF Challenge Framework for Windows 8 and above☆155Updated 4 years ago
- Content from presentation at BHUSA 2017☆181Updated 8 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆112Updated last year
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- A branch-monitor-based solution for process monitoring.☆133Updated 5 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 8 years ago
- qb-sync is an open source tool to add some helpful glue between IDA Pro and Windbg. Its core feature is to dynamically synchronize IDA's …☆122Updated 10 years ago
- Cross Architecture Shellcode in C☆203Updated 9 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆365Updated 5 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago