FSecureLABS / ViridianFuzzer
Kernel driver to fuzz Hyper-V hypercalls
☆135Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for ViridianFuzzer
- A fork of AFL for fuzzing Windows binaries☆53Updated 5 years ago
- kernel pool windbg extension☆79Updated 9 years ago
- windbg plugin for win32k debugging☆72Updated 5 years ago
- ☆152Updated 5 years ago
- ☆62Updated 7 years ago
- Toolkit for Hyper-V security research☆155Updated 2 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆113Updated 8 months ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 4 years ago
- ☆89Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆49Updated 4 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 6 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆69Updated last year
- ☆38Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆81Updated 2 years ago
- WCTF 2019 challenge☆99Updated 5 years ago
- ☆134Updated 3 years ago
- haze binary fuzzer☆52Updated 6 months ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆73Updated 4 months ago
- ☆238Updated 4 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- ☆174Updated 5 years ago
- PoC for a taint based attack on VMProtect☆109Updated 5 years ago
- Windows RPC Python fuzzer☆156Updated 7 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 6 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆126Updated 4 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 5 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆78Updated 6 years ago