kkamagui / shadow-box-for-x86Links
Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)
☆188Updated 6 years ago
Alternatives and similar repositories for shadow-box-for-x86
Users that are interested in shadow-box-for-x86 are comparing it to the libraries listed below
Sorting:
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- Cross Architecture Shellcode in C☆207Updated 9 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆170Updated 9 years ago
- Implementation of the SMM rootkit "The Watcher"☆130Updated 3 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Updated 9 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 9 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- ☆173Updated 3 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 7 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆171Updated 10 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆341Updated 6 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆378Updated 6 years ago
- ELF packer - x86_64☆73Updated 10 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Updated 8 years ago
- Notes on various topics I'm interested in☆160Updated 3 weeks ago
- radare2 + miasm2 = ♥☆102Updated 5 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆234Updated 3 years ago
- Hypervisor-based debugger☆190Updated 5 years ago
- Decompiler for x86 and x86-64 ELF binaries☆221Updated 6 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆220Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Updated 7 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆184Updated 7 years ago