k0keoyo / ntoskrnl-symbol-pdb-and-undocument-structuresLinks
ntoskrnl symbol pdb and undocument structures
☆24Updated 7 years ago
Alternatives and similar repositories for ntoskrnl-symbol-pdb-and-undocument-structures
Users that are interested in ntoskrnl-symbol-pdb-and-undocument-structures are comparing it to the libraries listed below
Sorting:
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated 10 months ago
- map driver to memory☆25Updated 6 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- ☆27Updated 6 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆35Updated 3 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆67Updated 5 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- ☆45Updated 4 years ago
- Polymorphic Stub Creator☆33Updated 7 years ago
- ☆14Updated 7 years ago
- 大表哥的Syscall-Monitor☆34Updated 5 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 6 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆50Updated 6 years ago
- Windows anti-rootkit library☆39Updated 10 years ago
- ☆16Updated 5 years ago
- This repository contains some tools that I have written in the past☆28Updated last year
- ☆19Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆106Updated 5 years ago
- exploit termdd.sys(support kb4499175)☆59Updated 5 years ago
- ☆34Updated 3 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆46Updated 8 years ago
- A POC for Windows Extension Host hooking☆22Updated 5 years ago
- ☆26Updated 7 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆32Updated 7 years ago