kkamagui / shadow-box-for-x86
Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)
☆185Updated 5 years ago
Alternatives and similar repositories for shadow-box-for-x86
Users that are interested in shadow-box-for-x86 are comparing it to the libraries listed below
Sorting:
- PEDA-like debugger UI for WinDbg☆204Updated last year
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆133Updated 6 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- ☆62Updated last year
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆336Updated 6 years ago
- grap: define and match graph patterns within binaries☆171Updated 4 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆301Updated 6 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Implementation of the SMM rootkit "The Watcher"☆126Updated 3 years ago
- Notes on various topics I'm interested in☆158Updated 9 years ago
- radare2 + miasm2 = ♥☆103Updated 5 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆217Updated 4 years ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 8 years ago
- A program to draw rectangles from heap traces.☆133Updated 5 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆135Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- ☆87Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆216Updated 6 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago
- A linux system call fuzzer using TriforceAFL☆176Updated last year
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆302Updated 8 months ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 7 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago