n3k / CansecWest2016_Getting_Physical
CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems
☆27Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for CansecWest2016_Getting_Physical
- ☆33Updated 9 years ago
- A pin tool to visualise heap operations☆21Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 7 years ago
- ☆25Updated 6 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 5 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 7 years ago
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Updated 7 years ago
- ☆44Updated 6 years ago
- A windbg extension, extracting token related contents☆41Updated 3 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 8 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- Windows SMEP Bypass U=S☆37Updated 8 years ago
- ☆39Updated 3 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 9 years ago
- AFL "mostly" ported to cygwin☆26Updated 8 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Updated 4 years ago
- ☆59Updated 8 years ago
- QTrace, a "zero knowledge" system call tracer☆51Updated 9 years ago
- Use CVE-2016-3308 corrupt win32k desktop heap☆50Updated 8 years ago
- ☆28Updated 2 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆131Updated 10 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 6 years ago
- Automatically exported from code.google.com/p/mynav☆28Updated 9 years ago
- ☆87Updated 9 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 12 years ago