ayoubfaouzi / linux-kernel
Linux kernel internals' notes
☆19Updated 6 months ago
Alternatives and similar repositories for linux-kernel:
Users that are interested in linux-kernel are comparing it to the libraries listed below
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year
- PyKD DLLs for x86 and x64 platforms☆16Updated last year
- ☆40Updated 3 years ago
- ☆14Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆130Updated 9 months ago
- ☆22Updated 4 years ago
- This is a simple driver with x64 inline assembly☆54Updated 4 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆78Updated 4 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆67Updated last year
- ☆43Updated 3 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 7 months ago
- ☆45Updated 4 years ago
- A research project about Windows notify routines.☆35Updated 4 years ago
- ☆28Updated 4 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 5 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Sample project for kernel debugging automation with Vagrant☆60Updated 4 years ago
- ☆33Updated 3 years ago
- AMD SVM hypervisor rootkit proof of concept☆44Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆79Updated 4 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆48Updated 4 years ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- ☆17Updated 3 years ago
- ☆28Updated 3 months ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆54Updated 3 years ago
- A set of small utilities, helpers for PIN tracers☆31Updated last year
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 4 years ago