DebugPrivilege / InsightEngineeringLinks
Hardcore Debugging
☆927Updated last week
Alternatives and similar repositories for InsightEngineering
Users that are interested in InsightEngineering are comparing it to the libraries listed below
Sorting:
- Living Off The Land Drivers☆1,348Updated last week
- Important notes and topics on my journey towards mastering Windows Internals☆420Updated last year
- A tool that shows detailed information about named pipes in Windows☆718Updated last year
- EDR Lab for Experimentation Purposes☆1,390Updated last month
- PoCs and tools for investigation of Windows process execution techniques☆945Updated last month
- ☆606Updated last month
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆471Updated 5 months ago
- Win32 and Kernel abusing techniques for pentesters☆970Updated 2 years ago
- Useful scripts for WinDbg using the debugger data model☆426Updated last year
- ☆1,765Updated last year
- A repository for additional files related to the book Windows Security Internals with PowerShell from No Starch Press.☆212Updated 4 months ago
- Operating System Design Review: A systematic analysis of modern systems architecture☆332Updated 3 weeks ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,220Updated 2 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆790Updated last year
- ☆513Updated 2 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆521Updated 6 months ago
- View ETW Provider manifest☆557Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆662Updated last week
- Spartacus DLL/COM Hijacking Toolkit☆1,074Updated last year
- Project for tracking publicly disclosed DLL Hijacking opportunities.☆854Updated 2 weeks ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆691Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆735Updated 6 months ago
- Different learning materials☆228Updated 3 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆676Updated last year
- The Definitive Guide To Process Cloning on Windows☆529Updated last year
- Dynamic unpacker based on PE-sieve☆787Updated 3 months ago
- A modern 32/64-bit position independent implant template☆1,270Updated 9 months ago
- A GUI and CLI tool for removing bloat from executables☆436Updated 5 months ago
- ☆1,071Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆894Updated 11 months ago