kkamagui / shadow-box-for-x86Links
Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)
☆188Updated 6 years ago
Alternatives and similar repositories for shadow-box-for-x86
Users that are interested in shadow-box-for-x86 are comparing it to the libraries listed below
Sorting:
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆134Updated 6 years ago
- Cross Architecture Shellcode in C☆206Updated 9 years ago
- ☆61Updated 2 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 10 years ago
- radare2 + miasm2 = ♥☆102Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆169Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- ELF packer - x86_64☆73Updated 10 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 9 years ago
- ☆172Updated 3 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆221Updated 4 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆309Updated 6 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Updated 7 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- a bare metal (type 1) VMM (hypervisor) with a python remote control API☆185Updated 7 years ago
- Notes on various topics I'm interested in☆160Updated 10 years ago
- grap: define and match graph patterns within binaries☆172Updated 4 years ago
- Windows API tracer for malware (oldname: unitracer)☆119Updated 8 years ago
- A novel technique to hide code from debuggers & disassemblers☆158Updated last year
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 7 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- ☆47Updated 7 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆184Updated 7 years ago
- Hypervisor-based debugger☆188Updated 4 years ago