lololosys / windbg-themeLinks
(l)user friendly WinDBG theme.
☆19Updated 6 years ago
Alternatives and similar repositories for windbg-theme
Users that are interested in windbg-theme are comparing it to the libraries listed below
Sorting:
- Recon 2023 slides and code☆80Updated 2 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆258Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 4 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 10 months ago
- Windows UEFI Bootkit☆69Updated last month
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆41Updated 4 months ago
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- ☆98Updated 4 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆118Updated last year
- Simple x86/x64 Assembler/Disassembler/Emulator☆188Updated 3 weeks ago
- Exploitable drivers, you know what I mean☆154Updated last month
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆247Updated 3 years ago
- Code samples that serve as references for Windows API functions☆77Updated last year
- Samples from my book Windows Native API programming☆80Updated 7 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆164Updated 3 years ago
- ☆269Updated 2 years ago
- Demo from the Malware Analysis and Development Webinar☆23Updated last year
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆89Updated 2 months ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆65Updated 3 years ago
- Reverse engineering winapi function loadlibrary.☆229Updated 2 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆185Updated 8 months ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆175Updated 3 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆35Updated last year
- Automated environment setup for Bootkit & Rootkit development.☆32Updated 4 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆225Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆77Updated 3 years ago