eclypsium / Screwed-DriversLinks
"Screwed Drivers" centralized information source for code references, links, etc.
☆372Updated 5 years ago
Alternatives and similar repositories for Screwed-Drivers
Users that are interested in Screwed-Drivers are comparing it to the libraries listed below
Sorting:
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆420Updated 3 years ago
- Extract Windows Defender database from vdm files and unpack it☆469Updated 3 months ago
- A library to develop kernel level Windows payloads for post HVCI era☆468Updated 4 years ago
- Expriments☆475Updated last year
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆333Updated last year
- My notes while studying Windows internals☆440Updated 11 months ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆219Updated 3 years ago
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆224Updated 3 weeks ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆631Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆782Updated 2 months ago
- A more stealthy variant of "DLL hollowing"☆358Updated last year
- Obfuscate specific windows apis with different apis☆1,017Updated 4 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆583Updated 2 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆713Updated 5 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆623Updated 8 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆398Updated 4 months ago
- My personal cheat sheet for using WinDbg for kernel debugging☆442Updated 7 months ago
- Quickly debug shellcode extracted during malware analysis☆618Updated 2 years ago
- Research on Windows Kernel Executive Callback Objects☆312Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆306Updated 7 years ago
- A DTrace on Windows Reimplementation☆366Updated last month
- Windows NT x64 syscall fuzzer☆626Updated 5 months ago
- A memory scanning evasion technique☆892Updated 8 years ago
- Useful scripts for WinDbg using the debugger data model☆426Updated last year
- XNTSV program for detailed viewing of system structures for Windows.☆469Updated this week
- A Binary Genetic Traits Lexer Framework☆518Updated 3 months ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆811Updated 4 years ago
- Supporting Data Archives for Ghidra☆284Updated 5 years ago
- A small bootkit which does not rely on x64 assembly.☆504Updated 6 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,019Updated 2 years ago