WinDbg workplace settings that I use for debugging
☆16Aug 3, 2017Updated 8 years ago
Alternatives and similar repositories for WinDbgSettings
Users that are interested in WinDbgSettings are comparing it to the libraries listed below
Sorting:
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated 10 months ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆89Oct 6, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- CVE-2017-10271 POC☆29Jan 10, 2018Updated 8 years ago
- ☆25Mar 19, 2025Updated 11 months ago
- ☆29Jan 15, 2021Updated 5 years ago
- simple driver to read and write☆19Apr 13, 2025Updated 10 months ago
- IDA Pro plugin that changes color of call instructions and works with all architectures☆59Nov 6, 2018Updated 7 years ago
- View handles and object for each object type☆64Sep 1, 2019Updated 6 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- Repository of vulnerabilities disclosed by ESET☆29Jul 13, 2022Updated 3 years ago
- A DLL that performs IAT hooking☆27Jul 6, 2018Updated 7 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- ☆22May 25, 2017Updated 8 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆32Mar 3, 2024Updated 2 years ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆55Nov 17, 2025Updated 3 months ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 8 years ago
- Assembly language files and Shellcode☆38Jul 21, 2021Updated 4 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- 2022 Updated Kernelmode-Code☆33Mar 23, 2024Updated last year
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Memory protection and randomization tests (not limited to PaX enabled kernels)☆12Mar 5, 2024Updated 2 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago