kkent030315 / Van1338Links
A journal for $6,000 Riot Vanguard bounty.
☆65Updated 2 years ago
Alternatives and similar repositories for Van1338
Users that are interested in Van1338 are comparing it to the libraries listed below
Sorting:
- Report and exploit of CVE-2023-36427☆89Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆46Updated last year
- dynamic binary instrumentation, analysis, and patching framework☆95Updated last month
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆38Updated last year
- ANY.RUN sandbox detection collection☆21Updated last year
- A few examples of how to trap virtual memory access on Windows.☆35Updated 10 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆67Updated 2 months ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 3 years ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 3 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- ☆72Updated 2 years ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆132Updated 3 weeks ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 9 months ago
- ntoskrnl.exe and bootmgfw.efi obfuscated with CodeDefender☆49Updated 3 weeks ago
- PyKD DLLs for x86 and x64 platforms☆16Updated 2 years ago
- ☆114Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll import☆89Updated last month
- Remove WPP calls from hexrays decompiled code☆54Updated 7 months ago
- Windows KASLR bypass using prefetch side-channel☆160Updated last year
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆78Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆114Updated 2 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆98Updated 5 months ago
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 8 months ago
- Exploitable drivers, you know what I mean☆153Updated last month