billti / v8dbg
Sample WinDbg extension
☆14Updated 5 years ago
Alternatives and similar repositories for v8dbg
Users that are interested in v8dbg are comparing it to the libraries listed below
Sorting:
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- prebuild angr wheels for Windows on x86_64☆14Updated 6 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- ☆33Updated 2 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆31Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- ☆13Updated 4 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆35Updated 3 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Updated 4 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- Microsoft Edge MemGC Internals☆17Updated 9 years ago
- Fuzzing Harness for FoxitReader 9.7 ConvertToPDF Function☆14Updated 5 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆31Updated 4 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆12Updated 8 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- Create and use macros in IDA's CLIs☆64Updated 2 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- QEMU to drcov trace file☆11Updated 4 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆15Updated 6 years ago
- vm -- code interpreter☆25Updated 6 years ago
- My commands and scripts extending WinDbg☆34Updated last month
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago