jeffli678 / writeupsLinks
writeups for CTFs and other stuff
☆23Updated 4 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- ☆48Updated 5 years ago
- A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers…☆70Updated 3 years ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- A set of small utilities, helpers for PIN tracers☆32Updated last year
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- ☆90Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- Slides from various conference talks☆37Updated 2 years ago
- ☆47Updated 5 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- A code parser for C-Style header files that lets you to parse function's prototypes and data types used in their parameters.☆94Updated 3 years ago
- ☆163Updated 3 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- clone of armadillo patched for windows☆47Updated 10 months ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- ☆14Updated 3 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆81Updated last year
- ☆28Updated 5 years ago
- ☆147Updated 2 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆38Updated 3 years ago
- A list of awesome resources about HyperDbg☆74Updated last month
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- ☆18Updated 5 years ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆30Updated 3 years ago
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆37Updated 4 years ago