hugsy / recon_2024_windbg_workshopLinks
☆74Updated last year
Alternatives and similar repositories for recon_2024_windbg_workshop
Users that are interested in recon_2024_windbg_workshop are comparing it to the libraries listed below
Sorting:
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- ☆85Updated 4 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆125Updated 2 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆98Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 2 months ago
- Writeups for CTF challenges☆34Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆162Updated 2 weeks ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- Recon 2023 slides and code☆80Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 4 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆125Updated last year
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 10 months ago
- Report and exploit of CVE-2023-36427☆88Updated 2 years ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- ☆149Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Updated 3 years ago
- ☆24Updated last year
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆147Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆63Updated 8 months ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆172Updated last year
- ☆148Updated 2 years ago
- ☆58Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year