ioncodes / kdbg-driver-workstationLinks
☆14Updated 3 years ago
Alternatives and similar repositories for kdbg-driver-workstation
Users that are interested in kdbg-driver-workstation are comparing it to the libraries listed below
Sorting:
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- ☆43Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- ☆21Updated 4 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- ☆48Updated 5 years ago
- ☆48Updated 5 years ago
- Windows kernel PDB data parsed into YAML☆41Updated 10 months ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- ☆29Updated 3 weeks ago
- PyKD DLLs for x86 and x64 platforms☆17Updated 2 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Google Chrome Use After Free☆59Updated 3 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 3 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- SPI flash read MitM attack PoC☆38Updated 3 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆70Updated 2 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- ☆28Updated 5 years ago
- ☆13Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated 11 months ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆34Updated last year