googleprojectzero / symboliclink-testing-tools
☆764Updated 2 years ago
Alternatives and similar repositories for symboliclink-testing-tools:
Users that are interested in symboliclink-testing-tools are comparing it to the libraries listed below
- Token Privilege Research☆798Updated 7 years ago
- PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.☆630Updated 5 months ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆949Updated last year
- collect for learning cases☆574Updated 7 months ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆714Updated 2 months ago
- Checksec, but for Windows: static detection of security mitigations in executables☆573Updated 2 weeks ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,109Updated last month
- ☆478Updated 7 years ago
- Dump of win32k POCs for bugs I've found☆372Updated 2 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆324Updated 2 years ago
- A collection of links related to VMware escape exploits☆1,394Updated 4 months ago
- A small, null-free Windows shellcode that executes calc.exe (x86/x64, all OS/SPs)☆398Updated 8 months ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆586Updated 7 years ago
- A memory scanning evasion technique☆852Updated 7 years ago
- Also known by Microsoft as Knifecoat☆1,121Updated 2 years ago
- Quickly debug shellcode extracted during malware analysis☆577Updated last year
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆382Updated 4 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆804Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,116Updated last year
- LSASS memory dumper using direct system calls and API unhooking.☆1,505Updated 4 years ago
- Payload development framework☆681Updated 2 weeks ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆389Updated 5 years ago
- AV/EDR evasion via direct system calls.☆1,833Updated 2 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆290Updated 6 years ago
- A tool to elevate privilege with Windows Tokens☆1,028Updated last year
- Extract Windows Defender database from vdm files and unpack it☆436Updated 4 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆269Updated 4 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆501Updated 5 years ago
- ☆231Updated 7 years ago
- Expriments☆455Updated 3 months ago