bruce30262 / TWindbgLinks
PEDA-like debugger UI for WinDbg
☆205Updated last year
Alternatives and similar repositories for TWindbg
Users that are interested in TWindbg are comparing it to the libraries listed below
Sorting:
- ☆181Updated 6 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆167Updated 10 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆135Updated 9 years ago
- Have fun with the LowFragmentationHeap☆242Updated 4 years ago
- Packages for IDA Pro (written in python but supports all)☆133Updated 4 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆126Updated last year
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆211Updated 2 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- ☆89Updated 6 years ago
- Collaborative reverse engineering plugin for IDA Pro. Latest version, including IDA 7.0 support, is not back ward compatible with earlier…☆98Updated 3 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆181Updated 7 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆279Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 5 years ago
- CTF Challenge Framework for Windows 8 and above☆155Updated 4 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- WCTF 2019 challenge☆100Updated 6 years ago
- DynamoRIO plugin to get ASAN and SanitizerCoverage compatible output for closed-source executables☆208Updated 3 years ago
- kernel pool windbg extension☆84Updated 10 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆337Updated 6 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆304Updated 11 months ago
- ☆249Updated 4 years ago
- Python scripts for reverse engineering.☆184Updated 4 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- ☆154Updated 6 years ago
- extending IDA's string navigation capabilities☆176Updated 4 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆305Updated 6 years ago
- ☆51Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆149Updated 6 years ago