bootkitsbook / bootkitsLinks
☆68Updated 6 years ago
Alternatives and similar repositories for bootkits
Users that are interested in bootkits are comparing it to the libraries listed below
Sorting:
- ☆108Updated 6 years ago
- ☆35Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆97Updated 3 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 7 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Updated 6 years ago
- ☆73Updated 2 years ago
- Flare-On solutions☆37Updated 6 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- Driver Initial Reconnaissance Tool☆124Updated 5 years ago
- ☆21Updated last month
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- ☆13Updated 6 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆127Updated 3 years ago
- WinDbg workplace settings that I use for debugging☆16Updated 8 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- ☆34Updated 4 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆125Updated 6 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Updated 6 years ago
- Elevation of privilege detector based on HyperPlatform☆123Updated 8 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 6 years ago
- Enumerate Windows Defender threat families and dump their names according category☆93Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago