chaelim / BrokenGuardPage
Windows Broken Stack Guard Page
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for BrokenGuardPage
- Windows device tree walker☆15Updated 6 years ago
- hooking KiUserApcDispatcher☆22Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- Static library and headers for linking your software with ntdll.dll☆30Updated 4 years ago
- ☆18Updated 9 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- ☆15Updated 5 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 6 years ago
- ☆18Updated 5 years ago
- A POC for Windows Extension Host hooking☆22Updated 5 years ago
- Code Integrity Violation Spotter☆17Updated 5 months ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 3 years ago
- Contains various pintools to supplement the Intel DBI framework☆12Updated 9 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆30Updated 5 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆15Updated 2 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Miscellaneous old Exploit code and PoCs☆15Updated last month
- simple plugin for lastest olly versions to display the callstack☆15Updated 11 years ago
- ☆19Updated 5 years ago
- D00☆5Updated 3 years ago
- ☆13Updated 3 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆18Updated 8 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Updated last year
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- Kernel-mode file scanner☆17Updated 6 years ago