Signal-Labs / IOCTLDump
☆142Updated last year
Alternatives and similar repositories for IOCTLDump:
Users that are interested in IOCTLDump are comparing it to the libraries listed below
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- ☆158Updated 3 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆135Updated 2 years ago
- Unofficial Common Log File System (CLFS) Documentation☆169Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆196Updated 3 weeks ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆224Updated 2 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆127Updated 6 months ago
- Report and exploit of CVE-2023-36427☆89Updated last year
- Abusing exceptions for code execution.☆109Updated 2 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆150Updated last week
- ☆143Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆175Updated last week
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆228Updated 3 years ago
- APC Internals Research Code☆161Updated 4 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆79Updated 4 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆119Updated 2 weeks ago
- Documenting system information classes and their uses☆50Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- Different tools for Microsoft Hyper-V researching☆48Updated 9 months ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 3 years ago
- Windows KASLR bypass using prefetch side-channel☆77Updated 10 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- Bindings for Microsoft WinDBG TTD☆216Updated last year
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 4 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆81Updated 8 months ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆76Updated 7 months ago
- ☆66Updated 2 years ago
- ☆71Updated this week