lololosys / windbg-themeLinks
(l)user friendly WinDBG theme.
☆19Updated 6 years ago
Alternatives and similar repositories for windbg-theme
Users that are interested in windbg-theme are comparing it to the libraries listed below
Sorting:
- Recon 2023 slides and code☆79Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago
- ☆96Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆112Updated 2 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆257Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆114Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆93Updated 3 years ago
- ☆265Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆159Updated 2 years ago
- Exploitable drivers, you know what I mean☆154Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆235Updated 3 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Updated 2 years ago
- ☆42Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 7 months ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆253Updated 2 years ago
- Simple x86/x64 Assembler/Disassembler/Emulator☆185Updated last year
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆32Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Files for the packer tutorial☆73Updated 4 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆119Updated last year
- Minifilter Callback Patching Proof-of-Concept☆74Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆76Updated 3 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆173Updated 2 years ago
- My notes while studying Windows exploitation☆190Updated 2 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆183Updated 5 months ago
- Early Work on Abyss Windows UEFI Bootkit☆43Updated last month
- Demo from the Malware Analysis and Development Webinar☆23Updated last year
- Abusing exceptions for code execution.☆112Updated 2 years ago