ioncodes / kdbg-driver-vagrantLinks
☆43Updated 3 years ago
Alternatives and similar repositories for kdbg-driver-vagrant
Users that are interested in kdbg-driver-vagrant are comparing it to the libraries listed below
Sorting:
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- ☆14Updated 3 years ago
- A code parser for C-Style header files that lets you to parse function's prototypes and data types used in their parameters.☆94Updated 3 years ago
- Hyper-V related resources☆31Updated last year
- ☆32Updated 3 years ago
- Sample project for kernel debugging automation with Vagrant☆60Updated 5 years ago
- AMD SVM hypervisor rootkit proof of concept☆47Updated 2 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year
- Set of plugins and library for dynamic pdb generation and synchronisation☆37Updated last year
- Python bindings for the Microsoft Hypervisor Platform APIs.☆80Updated 6 years ago
- IntroVirt is an guest introspection library for KVM☆56Updated last year
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- ☆81Updated 5 months ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆36Updated 4 years ago
- ☆49Updated 5 years ago
- Windows kernel PDB data parsed into YAML☆41Updated last week
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- Hyper-V scripts☆131Updated this week
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆32Updated 3 years ago
- ☆60Updated 8 months ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 9 months ago
- clone of armadillo patched for windows☆48Updated last year
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- SPI flash read MitM attack PoC☆39Updated 3 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated 2 months ago
- Python bindings for BochsCPU☆37Updated 3 months ago