kkamagui / shadow-box-for-x86
Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)
☆185Updated 5 years ago
Alternatives and similar repositories for shadow-box-for-x86:
Users that are interested in shadow-box-for-x86 are comparing it to the libraries listed below
- PEDA-like debugger UI for WinDbg☆203Updated last year
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆133Updated 6 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆301Updated 6 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆216Updated 4 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- ☆173Updated 2 years ago
- ☆85Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆131Updated 7 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆372Updated 6 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆82Updated 9 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆334Updated 5 years ago
- ☆62Updated last year
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 7 months ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- This is the new ftrace (https://github.com/elfmaster/ftrace) - Much faster, better resolution but not complete yet! :)☆108Updated 6 years ago
- gdbida - a visual bridge between a GDB session and IDA Pro's disassembler☆181Updated 6 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆160Updated 9 years ago
- ☆60Updated 9 years ago
- Malware Behavior Analyzer☆159Updated 7 years ago
- radare2 + miasm2 = ♥☆102Updated 5 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- r2con 2017 September 6-9☆97Updated 7 years ago