martinalebachew / LighthouseLinks
Activate Windows & Office 🔑
☆13Updated last year
Alternatives and similar repositories for Lighthouse
Users that are interested in Lighthouse are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- Helpful WinDBG command for kernel debugging☆28Updated 5 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆122Updated this week
- Hyper-V related resources☆31Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆67Updated 2 years ago
- Windows KASLR bypass using prefetch side-channel☆175Updated last year
- A collection of LLVM passes for obfuscating☆42Updated 2 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆169Updated 5 months ago
- Abusing exceptions for code execution.☆113Updated 3 years ago
- Another UEFI runtime bootkit☆36Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- windows rootkit☆60Updated last year
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆244Updated 3 months ago
- PyKD DLLs for x86 and x64 platforms☆18Updated 2 years ago
- Remove WPP calls from hexrays decompiled code☆56Updated last week
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆67Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆89Updated 3 months ago
- ☆149Updated 2 years ago
- Simple anti-instrumentation with EFLAGS.AC☆17Updated 10 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆95Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆162Updated last year
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Updated 3 weeks ago
- A high-performance C++ framework for emulating executable binaries☆128Updated 2 months ago
- ☆160Updated last month
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆96Updated 4 years ago
- Virtual Trust Level (VTL 1) secure call tracing☆95Updated 5 months ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆119Updated 2 weeks ago
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆42Updated 2 months ago
- Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.☆22Updated 5 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆71Updated 5 months ago