mytechnotalent / windows-kernel-debuggingLinks
A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows process creation at the kernel level, from boot to PspCreateProcess, using VMware Workstation.
☆19Updated 3 months ago
Alternatives and similar repositories for windows-kernel-debugging
Users that are interested in windows-kernel-debugging are comparing it to the libraries listed below
Sorting:
- Intel 64/Windows low-level experiments☆62Updated last month
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆35Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆91Updated 3 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆79Updated 3 months ago
- A C++/Asm template for PIC/EXE/DLL malware☆25Updated 2 months ago
- Callstack spoofing using a VEH because VEH all the things.☆23Updated 6 months ago
- ☆19Updated 4 years ago
- In-memory hiding technique☆56Updated 9 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆74Updated 11 months ago
- ☆84Updated last year
- ☆42Updated 7 months ago
- ☆33Updated last year
- A few examples of how to trap virtual memory access on Windows.☆34Updated 9 months ago
- ☆50Updated 2 months ago
- ☆32Updated 7 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Updated 5 months ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- break link between dll and it file on disk☆11Updated last year
- Example of building an application verifer DLL☆49Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆51Updated 4 months ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆52Updated last year
- A synergized Visual Studio and Rust development environment☆19Updated 8 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆29Updated last year
- BYOVD Technique Example using viragt64 driver☆55Updated last year
- ☆114Updated 3 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆37Updated 2 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆117Updated 2 months ago
- ☆50Updated 6 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Updated 5 months ago