jjensn / CVE-2024-36877Links
Exploit POC for CVE-2024-36877
☆47Updated last year
Alternatives and similar repositories for CVE-2024-36877
Users that are interested in CVE-2024-36877 are comparing it to the libraries listed below
Sorting:
- Report and exploit of CVE-2023-36427☆90Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆32Updated 2 years ago
- Different tools for Microsoft Hyper-V researching☆60Updated last month
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆35Updated 11 months ago
- Report and exploit of CVE-2024-21305.☆36Updated last year
- A simple but useful project maybe help you reverse Windows.☆38Updated last year
- Remove WPP calls from hexrays decompiled code☆52Updated 5 months ago
- dynamic binary instrumentation, analysis, and patching framework☆93Updated this week
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆93Updated 3 months ago
- IDA plugin to recover source code from panic information on rust☆17Updated 3 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 3 weeks ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆41Updated 2 months ago
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆27Updated 2 months ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- Windows kernel PDB data parsed into YAML☆39Updated 9 months ago
- A few examples of how to trap virtual memory access on Windows.☆33Updated 8 months ago
- ☆16Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆68Updated 2 years ago
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆37Updated this week
- ASUSTeK AsIO3 I/O driver unlock☆23Updated 4 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆84Updated 3 months ago
- Windows KASLR bypass using prefetch side-channel☆120Updated last year
- ☆30Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- ☆59Updated 3 years ago
- ☆22Updated 3 weeks ago