An application for obtaining, dumping and modifying token from user land.
☆26Nov 21, 2015Updated 10 years ago
Alternatives and similar repositories for TokenInsight
Users that are interested in TokenInsight are comparing it to the libraries listed below
Sorting:
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- An av windows engine with file guard and compress file enumator☆12Aug 25, 2018Updated 7 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- enhanced spy++☆10Feb 7, 2014Updated 12 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Lua Extension for Windbg☆21Oct 22, 2018Updated 7 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- ☆36Mar 22, 2017Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Polymorphic Stub Creator☆34Jun 11, 2017Updated 8 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Simple standalone bundle of NT core APIs☆25Mar 7, 2016Updated 9 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- Windows 64-bits driver☆17Dec 1, 2017Updated 8 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Jun 3, 2014Updated 11 years ago