long123king / TokenInsight
An application for obtaining, dumping and modifying token from user land.
☆27Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for TokenInsight
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆26Updated 7 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- reversed emet tool☆24Updated 12 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆33Updated 8 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆21Updated 7 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 5 years ago
- Kernel-mode file scanner☆17Updated 6 years ago
- A windbg extension, extracting token related contents☆41Updated 3 years ago
- A POC for Windows Extension Host hooking☆22Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Helper utility for debugging windows PE/PE+ loader.☆50Updated 9 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆13Updated 7 years ago
- ☆28Updated 9 years ago
- ☆33Updated 7 years ago
- CVE-2014-0816☆24Updated 8 years ago
- User-mode hook bypassing method☆32Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- ☆28Updated 7 years ago
- Using SEH to bypass CFG☆28Updated 7 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- DbgFlashVul☆12Updated 9 years ago