Sentinel-One / SKREAMLinks
SentinelOne's KeRnel Exploits Advanced Mitigations
☆54Updated 6 years ago
Alternatives and similar repositories for SKREAM
Users that are interested in SKREAM are comparing it to the libraries listed below
Sorting:
- A fast execution trace symbolizer for Windows.☆131Updated last year
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 11 months ago
- ☆50Updated 8 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆74Updated 6 years ago
- ☆34Updated 3 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 6 years ago
- ☆66Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆43Updated last year
- clone of armadillo patched for windows☆47Updated 7 months ago
- Enumerate user mode shared memory mappings on Windows.☆121Updated 4 years ago
- IDA plugin to explore and browse tags☆56Updated 5 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆123Updated 6 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Simple library to spray the Windows Kernel Pool☆109Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- kernel pool windbg extension☆84Updated 9 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Analyses in IDA/Hex-Rays☆83Updated 2 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆71Updated 8 years ago
- ☆71Updated last year
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆51Updated last year
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- ☆33Updated 2 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- Hyper-V Research is trendy now☆181Updated last year