not-matthias / kernel-log-rsLinks
A minimalistic logger for Windows Kernel Drivers.
☆25Updated last year
Alternatives and similar repositories for kernel-log-rs
Users that are interested in kernel-log-rs are comparing it to the libraries listed below
Sorting:
- PDB Rewriting Rust Library☆26Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆42Updated 2 years ago
- Example of building an application verifer DLL☆50Updated last year
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 3 years ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆47Updated 6 months ago
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆41Updated 2 weeks ago
- Signature finder (from PE-bear)☆39Updated 4 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Updated 3 years ago
- ☆59Updated 3 years ago
- ☆22Updated 2 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆47Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- Report and exploit of CVE-2024-21305.☆38Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆36Updated 3 years ago
- Minimalistic Windows Kernel Allocator.☆49Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆68Updated 3 months ago
- devirtualization vmprotect☆64Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆66Updated 2 years ago
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 4 months ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 4 years ago
- ☆14Updated 2 years ago
- ☆21Updated 2 years ago
- Windows kernel PDB data parsed into YAML☆42Updated last month
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆36Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆77Updated 2 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆88Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Updated 2 years ago