KasperskyLab / WinDbg-JS-Scripts
☆34Updated 2 years ago
Alternatives and similar repositories for WinDbg-JS-Scripts:
Users that are interested in WinDbg-JS-Scripts are comparing it to the libraries listed below
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆78Updated 4 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆94Updated 3 weeks ago
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆54Updated 5 months ago
- ☆26Updated 3 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆50Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- Documenting system information classes and their uses☆50Updated 3 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆84Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 3 years ago
- ☆18Updated 3 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆54Updated 3 years ago
- APC Internals Research Code☆161Updated 4 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆139Updated 5 years ago
- ☆67Updated 4 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 7 months ago
- Miscellaneous Code and Docs☆75Updated last year
- ☆58Updated 2 years ago
- ☆106Updated 2 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆114Updated last year
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆67Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- clone of armadillo patched for windows☆46Updated 3 months ago
- Application Verifier Dynamic Fault Injection☆34Updated 4 months ago
- ☆31Updated 2 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year