airbus-cert / ttd2mdmpLinks
Extract data of TTD trace file to a minidump
☆30Updated 2 years ago
Alternatives and similar repositories for ttd2mdmp
Users that are interested in ttd2mdmp are comparing it to the libraries listed below
Sorting:
- ☆25Updated last year
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆37Updated 2 months ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- ☆14Updated 3 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 5 years ago
- Helper idapython code for reversing kmdf drivers☆75Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Slides from various conference talks☆37Updated 2 years ago
- ☆13Updated last year
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 3 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆14Updated 2 years ago
- ☆12Updated 5 years ago
- Windows kernel PDB data parsed into YAML☆41Updated 11 months ago
- ☆49Updated 5 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- ☆12Updated 2 years ago
- ☆21Updated 4 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated 2 years ago
- javascript extension of windbg for hacker.☆16Updated 2 years ago
- Repository of vulnerabilities disclosed by ESET☆28Updated 3 years ago
- ☆11Updated 3 years ago
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆37Updated 4 years ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 10 months ago
- SPI flash read MitM attack PoC☆39Updated 3 years ago
- ☆28Updated 5 years ago