kkent030315 / Van1338Links
A journal for $6,000 Riot Vanguard bounty.
☆67Updated 2 years ago
Alternatives and similar repositories for Van1338
Users that are interested in Van1338 are comparing it to the libraries listed below
Sorting:
- Report and exploit of CVE-2023-36427☆90Updated 2 years ago
- Abusing exceptions for code execution.☆113Updated 3 years ago
- Report and exploit of CVE-2024-21305.☆38Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆100Updated 3 weeks ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆47Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆70Updated 4 months ago
- binary instrumentation, analysis, and patching framework☆100Updated this week
- Remove WPP calls from hexrays decompiled code☆54Updated 9 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆138Updated 3 months ago
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 5 months ago
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- ☆72Updated 2 years ago
- Windows KASLR bypass using prefetch side-channel☆173Updated last year
- PyKD DLLs for x86 and x64 platforms☆18Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Updated 3 years ago
- Exploitable drivers, you know what I mean☆153Updated 2 months ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago
- A few examples of how to trap virtual memory access on Windows.☆39Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- ☆30Updated last week
- ☆117Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- Analysis of the vulnerability☆50Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- devirtualization vmprotect☆65Updated 2 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆115Updated last week
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆95Updated 4 years ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆47Updated 3 years ago