IgorKorkin / AllMemPro
AllMemPro
☆43Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for AllMemPro
- PoC for CVE-2017-0075☆36Updated 5 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 6 years ago
- Kernel-mode file scanner☆17Updated 6 years ago
- Crappy Win32k syscall fuzzer☆13Updated 9 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆27Updated 6 years ago
- ☆31Updated 6 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆33Updated 4 months ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆14Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆26Updated 7 years ago
- ☆33Updated 3 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 6 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 6 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆50Updated 6 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆31Updated 5 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆54Updated 4 years ago
- A windbg extension, extracting token related contents☆41Updated 3 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 8 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆53Updated 7 years ago
- IDA 7.0 meets watch view!☆41Updated 3 years ago
- Malware analysis tool based on taint analysis.☆14Updated 2 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆21Updated 7 years ago