long123king / TokenInsight
An application for obtaining, dumping and modifying token from user land.
☆27Updated 9 years ago
Alternatives and similar repositories for TokenInsight:
Users that are interested in TokenInsight are comparing it to the libraries listed below
- A sample project for using Capstone from a driver in Visual Studio 2015☆33Updated 8 years ago
- ☆28Updated 7 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- ☆22Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 7 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- Using SEH to bypass CFG☆29Updated 7 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- CVE-2014-0816☆24Updated 8 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- reversed emet tool☆24Updated 12 years ago
- A POC for Windows Extension Host hooking☆22Updated 5 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 9 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Helper utility for debugging windows PE/PE+ loader.☆51Updated 9 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- ☆31Updated 7 years ago
- DbgFlashVul☆12Updated 9 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- Malwarebytes Antivirus CVE☆8Updated 6 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- ☆12Updated 7 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆54Updated 8 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago