KiFilterFiberContext / windows-software-policyLinks
Research on obfuscated licensing APIs / CLIP service in the Windows kernel
☆125Updated 3 years ago
Alternatives and similar repositories for windows-software-policy
Users that are interested in windows-software-policy are comparing it to the libraries listed below
Sorting:
- Integration of Microsoft Warbird with the MSVC compiler☆115Updated 2 years ago
- Reimplementation of Microsoft's Warbird obuscator☆153Updated last year
- Documentation of Microsoft's Warbird obfuscation☆53Updated last year
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 3 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆88Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆77Updated last month
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated 3 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆257Updated 3 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆157Updated last year
- Different tools for Microsoft Hyper-V researching☆63Updated 4 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆99Updated 6 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆45Updated last year
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 8 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆209Updated last year
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- An x64dbg plugin which marks XFG call signatures as data☆78Updated 2 years ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆35Updated last year
- PDB file inspection tool☆109Updated 2 weeks ago
- WinLicense key extraction via Intel PIN☆107Updated last year
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆309Updated last year
- Simple windows API logger☆109Updated 6 years ago
- Advanced driver monitoring utility.☆217Updated 3 years ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆41Updated 5 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆129Updated 2 years ago
- Example of using Windows Platform Binary Table (WPBT)☆26Updated 2 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆155Updated last year
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆90Updated last month
- Documenting system information classes and their uses☆56Updated 4 years ago