alex-ilgayev / windbg-kernel-debug-cheat-sheet
Helpful WinDBG command for kernel debugging
☆22Updated 4 years ago
Alternatives and similar repositories for windbg-kernel-debug-cheat-sheet:
Users that are interested in windbg-kernel-debug-cheat-sheet are comparing it to the libraries listed below
- Writeups for CTF challenges☆30Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆89Updated 3 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆133Updated 7 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆151Updated last year
- ☆73Updated 9 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆86Updated 2 years ago
- ☆145Updated last year
- ☆82Updated 10 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆152Updated 3 weeks ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆191Updated last week
- Static Binary Instrumentation tool for Windows x64 executables☆198Updated last month
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆81Updated 4 years ago
- ☆67Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆225Updated 2 years ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆116Updated 4 months ago
- ☆158Updated 3 years ago
- ☆142Updated last year
- ☆13Updated 8 months ago
- ☆47Updated last month
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- a small curation of created/stolen scripts for reverse engineering☆12Updated 11 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆98Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆91Updated 5 months ago
- This repo contains EXPs about Vulnerable Windows Driver☆37Updated 10 months ago
- ☆31Updated 2 years ago
- MalUnpack companion driver☆95Updated 9 months ago
- Get information about stripped rust executables☆27Updated last week
- Unofficial Common Log File System (CLFS) Documentation☆174Updated 3 years ago
- Rust symbol recovery tool☆45Updated last week
- Finding Truth in the Shadows☆89Updated 2 years ago