honorarybot / WinDbgSettingsLinks
WinDbg workplace settings that I use for debugging
☆16Updated 8 years ago
Alternatives and similar repositories for WinDbgSettings
Users that are interested in WinDbgSettings are comparing it to the libraries listed below
Sorting:
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆73Updated last year
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- ☆50Updated 8 years ago
- ☆34Updated 4 years ago
- This is a place to share my miscellaneous projects.☆114Updated 5 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated last year
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- A C polymorphic and metamorphic engine☆71Updated 6 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 6 years ago
- IDA script for vmprotect Windows Api address decoder☆52Updated 4 years ago
- reverse engineering extension plugin for windbg☆119Updated 6 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- Python bindings for the Microsoft Hypervisor Platform APIs.☆79Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Static unpacker for FinSpy VM☆103Updated 4 years ago
- ☆67Updated 6 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Updated 6 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Updated 9 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 10 years ago
- ☆21Updated 2 weeks ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- ☆72Updated 11 years ago
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago
- Virtualization detection through speculative execution PoCs and papers☆68Updated 7 years ago
- Full DLL Hooking, phrack 65☆53Updated 2 years ago