A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows process creation at the kernel level, from boot to PspCreateProcess, using VMware Workstation.
☆27Nov 26, 2025Updated 5 months ago
Alternatives and similar repositories for windows-kernel-debugging
Users that are interested in windows-kernel-debugging are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆11Mar 22, 2021Updated 5 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- Python wrapper for FASM☆15May 23, 2015Updated 10 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆13Mar 24, 2026Updated last month
- Toolkit of Projects to attack and evade Event Trace for Windows☆27Aug 28, 2025Updated 8 months ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Utilities for Pentesting with BloodHound☆23Updated this week
- A lightweight packet filtering firewall framework for windows platform☆11Jan 31, 2025Updated last year
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆146Apr 15, 2026Updated 2 weeks ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Small micro-coded RISC-V softcore☆15Nov 27, 2018Updated 7 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Splitting and executing shellcode across multiple pages☆104Jun 8, 2023Updated 2 years ago
- Simple readonly FUSE driver for FAT filesystems☆12Jan 27, 2016Updated 10 years ago
- Living of the Land of Free SaaS☆71Mar 22, 2026Updated last month
- Simple Ransoware to attack Windows 🌟☆25Apr 19, 2023Updated 3 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆10May 4, 2023Updated 2 years ago
- Simple GUI elements for AVR and arduino simulation. Programmed in python, based on pygame. Simavr is used for simulation.☆16Apr 13, 2013Updated 13 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆10Apr 6, 2023Updated 3 years ago
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated 2 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆114Jan 26, 2026Updated 3 months ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆30Apr 20, 2026Updated last week
- Test bench lab for Shellcode Obfuscation☆36Sep 2, 2025Updated 7 months ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 3 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Simple C++ Reverse Shell☆12Nov 22, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆16Oct 9, 2021Updated 4 years ago
- Bad Apple in Amiga Anim format, complete with a guide on how to make your own Sound Anims☆10Jul 2, 2020Updated 5 years ago
- Position-independent Reflective Loader for macOS☆122Feb 19, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Implementing AES 256 CBC in AES-NI - MASM Format☆20Aug 9, 2025Updated 8 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- A set of scripts to help automate the management of Burp Collaborator☆13Sep 5, 2025Updated 7 months ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated last month
- Tool designed to exfiltrate OneDrive Business OCR Data☆127Jan 27, 2025Updated last year
- Anti-Malware security solution for Windows environment.☆20Jul 10, 2021Updated 4 years ago