A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows process creation at the kernel level, from boot to PspCreateProcess, using VMware Workstation.
☆26Nov 26, 2025Updated 4 months ago
Alternatives and similar repositories for windows-kernel-debugging
Users that are interested in windows-kernel-debugging are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- Python wrapper for FASM☆15May 23, 2015Updated 10 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 6 months ago
- ☆13Mar 24, 2026Updated 2 weeks ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆27Aug 28, 2025Updated 7 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Utilities for Pentesting with BloodHound☆23Updated this week
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 11 months ago
- A lightweight packet filtering firewall framework for windows platform☆11Jan 31, 2025Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 6 months ago
- Living of the Land of Free SaaS☆69Mar 22, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- Simple Ransoware to attack Windows 🌟☆26Apr 19, 2023Updated 2 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Simple GUI elements for AVR and arduino simulation. Programmed in python, based on pygame. Simavr is used for simulation.☆16Apr 13, 2013Updated 12 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 3 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated last month
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆113Jan 26, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆45Oct 10, 2025Updated 5 months ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆30Oct 26, 2025Updated 5 months ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 3 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Saves pages to Wayback machine☆12Dec 2, 2024Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆20Aug 9, 2025Updated 8 months ago
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated last month
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tool designed to exfiltrate OneDrive Business OCR Data☆128Jan 27, 2025Updated last year
- Anti-Malware security solution for Windows environment.☆20Jul 10, 2021Updated 4 years ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆62Updated this week
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- ☆31Feb 28, 2025Updated last year
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated last month
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year