almost-real / IDBGLinks
Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily
☆14Updated 6 years ago
Alternatives and similar repositories for IDBG
Users that are interested in IDBG are comparing it to the libraries listed below
Sorting:
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- ☆12Updated 7 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- Windows registry files interactive viewer☆9Updated 8 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- ☆13Updated 7 years ago
- Dynamic binary analysis via platform emulation☆12Updated 6 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Windows device tree walker☆15Updated 6 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 7 years ago
- 파일시스템 미니필터 드라이버 (교육용 코드)☆6Updated 6 years ago
- wow64 syscall filter☆13Updated 10 years ago
- PIN Tool for monitoring calls and writes from obfuscated code.☆26Updated 5 years ago
- ☆28Updated 8 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 9 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- CVE-2014-0816☆25Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- ☆12Updated 10 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- ☆13Updated 6 years ago
- ☆14Updated 7 years ago
- ☆12Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 10 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago