Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)
☆85Jul 16, 2016Updated 9 years ago
Alternatives and similar repositories for win10_heap
Users that are interested in win10_heap are comparing it to the libraries listed below
Sorting:
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆335Oct 31, 2022Updated 3 years ago
- A "general-purpose" tracing tool☆39Jun 22, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- TrueType and OpenType font fuzzing toolset☆438Aug 28, 2019Updated 6 years ago
- ☆46Jun 14, 2018Updated 7 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆635Jul 7, 2017Updated 8 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Content from presentation at BHUSA 2017☆180Jul 27, 2017Updated 8 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- A drop-in replacement for the C++ STL for kernel mode Windows drivers. The goal is to have implementations for things like the standard a…☆33Jul 12, 2016Updated 9 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- deprecated☆27Mar 20, 2019Updated 7 years ago
- windows net program☆13Oct 16, 2014Updated 11 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago