L4ys / IDA-WPP-RemoverLinks
Remove WPP calls from hexrays decompiled code
☆52Updated 4 months ago
Alternatives and similar repositories for IDA-WPP-Remover
Users that are interested in IDA-WPP-Remover are comparing it to the libraries listed below
Sorting:
- This repo contains EXPs about Vulnerable Windows Driver☆46Updated last year
- A simple but useful project maybe help you reverse Windows.☆38Updated last year
- Windows KASLR bypass using prefetch side-channel☆118Updated last year
- Report and exploit of CVE-2023-36427☆90Updated last year
- LLVM based obfuscation engine☆98Updated 2 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆27Updated 2 months ago
- POC for CVE-2023-29360☆12Updated 11 months ago
- Repo with different exploits & PoCs☆64Updated 3 months ago
- ☆145Updated last year
- a IDA plugin helps you to manage your IDA Comments☆22Updated 10 months ago
- Report and exploit of CVE-2024-21305.☆36Updated last year
- Different tools for Microsoft Hyper-V researching☆60Updated last month
- IDA plugin to make classes automatically☆17Updated 9 months ago
- dynamic binary instrumentation, analysis, and patching framework☆93Updated this week
- poc code for CVE-2024-38080☆30Updated 11 months ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆41Updated 3 months ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 3 weeks ago
- Security research helper for CLFS drivers☆14Updated 11 months ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆25Updated 3 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆84Updated 2 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆76Updated 6 months ago
- Windows 11 24H2 Runtime PatchGuard Bypass☆153Updated this week
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated 2 years ago
- Inlay hints for hex-rays☆67Updated 4 months ago
- A few examples of how to trap virtual memory access on Windows.☆33Updated 8 months ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆41Updated 2 months ago
- ☆61Updated 2 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆35Updated 4 months ago
- ☆20Updated 7 months ago
- CVE-2021-36955☆14Updated 2 years ago