h0mbre / ioctl.py
☆20Updated 4 years ago
Related projects: ⓘ
- Local OXID Resolver (LCLOR) : Research and Tooling☆31Updated 3 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆41Updated 4 years ago
- Helper idapython code for reversing kmdf drivers☆68Updated 2 years ago
- ☆44Updated 4 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆52Updated 5 years ago
- Clone running process with ZwCreateProcess☆58Updated 3 years ago
- ☆17Updated 3 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆94Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆52Updated 2 years ago
- A ready-made template for a project based on libpeconv.☆40Updated last year
- ☆56Updated 2 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆32Updated 3 years ago
- A set of small utilities, helpers for PIN tracers☆31Updated 11 months ago
- Example for PagedOut!☆24Updated 4 years ago
- This is a simple driver with x64 inline assembly☆52Updated 4 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- ☆49Updated this week
- ☆22Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 5 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 3 years ago
- ☆10Updated 2 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103Updated 4 years ago
- Sysmon shenanigans☆65Updated 3 years ago
- ☆20Updated 3 years ago
- PoC for hiding PE exports☆65Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆81Updated 2 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆26Updated 3 years ago
- ☆23Updated 10 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago