mstange / symsrvLinks
Download pdbs from symbol servers and cache locally, parse symbol paths from env vars
☆21Updated 10 months ago
Alternatives and similar repositories for symsrv
Users that are interested in symsrv are comparing it to the libraries listed below
Sorting:
- Example of building an application verifer DLL☆50Updated last year
- Sample for Creating a new kernel object type and supporting API☆27Updated last year
- WinDbg installer/updater☆42Updated 2 years ago
- PDB Rewriting Rust Library☆26Updated last year
- A WinDbg extension to trace COM interactions☆131Updated 5 months ago
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆24Updated last year
- Debug Print viewer (user and kernel)☆71Updated last year
- Windows kernel PDB data parsed into YAML☆42Updated 3 months ago
- Elevate arbitrary MSR writes to kernel execution.☆43Updated 2 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- Helper crate for building Windows Kernel Drivers.☆24Updated 2 years ago
- x86-64 Automated test data generator☆26Updated 5 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆49Updated last year
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆36Updated 4 years ago
- INF Studio for easier working with driver installation files☆39Updated 2 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Updated 2 years ago
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 6 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Updated 3 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- View Windows System in action☆45Updated 6 months ago
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆41Updated last month
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆50Updated last month
- Symbolic Execution based on lifting amd64 to z3☆30Updated last year
- Documenting system information classes and their uses☆56Updated 4 years ago
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- Lightweight PDB symbol parser and resolver☆27Updated last year
- A minimalistic logger for Windows Kernel Drivers.☆25Updated last year
- Windows Minidump loader for Ghidra☆29Updated 3 years ago
- Load dll with undocumented functions and debug symbols☆47Updated last year