jthuraisamy / ioctlpusLinks
☆120Updated 5 years ago
Alternatives and similar repositories for ioctlpus
Users that are interested in ioctlpus are comparing it to the libraries listed below
Sorting:
- Driver Initial Reconnaissance Tool☆123Updated 5 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆93Updated 3 years ago
- Windows Drivers☆99Updated 6 years ago
- ☆68Updated 3 years ago
- Simple 32/64-bit PEs loader.☆139Updated 6 years ago
- FLARE Kernel Shellcode Loader☆179Updated 6 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- Process reimaging proof of concept code☆96Updated 6 years ago
- Recon 2015 Presentation from Alex Ionescu☆244Updated 9 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆145Updated 2 years ago
- ☆163Updated 3 years ago
- Hyper-V Research is trendy now☆183Updated last year
- Set of antianalysis techniques found in malware☆130Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆232Updated 5 years ago
- Process Hollowing for 32 bit and 64 bit☆79Updated 7 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆145Updated 6 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- ☆147Updated 2 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- Windows Kernel Programming☆130Updated 5 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆237Updated 5 years ago
- Toy scripts for playing with WinDbg JS API☆237Updated last year
- A simple API monitor for Windbg☆63Updated 8 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆157Updated 6 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆146Updated 5 years ago
- APC Internals Research Code☆167Updated 5 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆92Updated 10 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆97Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago