CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems
☆28Apr 26, 2016Updated 9 years ago
Alternatives and similar repositories for CansecWest2016_Getting_Physical
Users that are interested in CansecWest2016_Getting_Physical are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- nyā☆71Oct 16, 2015Updated 10 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- ☆19Mar 16, 2017Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- browser narlyness☆50Dec 11, 2013Updated 12 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Dominator Tree LLVM Pass to Test Satisfiability☆46Mar 14, 2016Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Windows设备驱动开发 光盘(示例代码)☆10Jan 14, 2013Updated 13 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, can also remove IEEE 802.1Q (virtual lan) header. Works w…☆34Oct 14, 2018Updated 7 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- My UEFI security talk on ZeroNights 2015☆58Dec 13, 2015Updated 10 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- ☆12Dec 15, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- NDIS5/NDIS6 filter driver based simple firewall and static (1x1) NAT engine for Windows 7/8/10☆26Mar 20, 2023Updated 3 years ago