A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process and hooks DeviceIoControl!Kernel32 API and try to log or fuzz all I/O Control code I/O Buffer pointer, I/O buffer length that process sends to any Kernel driver.
☆67Apr 16, 2014Updated 11 years ago
Alternatives and similar repositories for iofuzz
Users that are interested in iofuzz are comparing it to the libraries listed below
Sorting:
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Fuzzing Harness for Firefox Mobile on Android☆40Mar 28, 2019Updated 6 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- A Browser Fuzzer for Vulnerbilities☆66Mar 20, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆126Jan 15, 2019Updated 7 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Jul 29, 2019Updated 6 years ago
- A web page based fuzzer that generates random JS statements then fuzz in the web-browser.☆60May 6, 2019Updated 6 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆119Dec 1, 2023Updated 2 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Feb 22, 2018Updated 8 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago