CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems
☆28Apr 26, 2016Updated 9 years ago
Alternatives and similar repositories for CansecWest2016_Getting_Physical
Users that are interested in CansecWest2016_Getting_Physical are comparing it to the libraries listed below
Sorting:
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- nyā☆70Oct 16, 2015Updated 10 years ago
- ☆19Mar 16, 2017Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Windows设备驱动开发 光盘(示例代码)☆10Jan 14, 2013Updated 13 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- My UEFI security talk on ZeroNights 2015☆58Dec 13, 2015Updated 10 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Mar 14, 2016Updated 9 years ago
- Educational tools for Binary Ninja☆20Jul 18, 2018Updated 7 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- The old integrity check bypass made by dude719.☆13Apr 2, 2016Updated 9 years ago
- ☆11Jun 10, 2015Updated 10 years ago