p0dalirius / pyPDBdownloadLinks
A Python script to download PDB files associated with a Portable Executable (PE)
☆121Updated 3 months ago
Alternatives and similar repositories for pyPDBdownload
Users that are interested in pyPDBdownload are comparing it to the libraries listed below
Sorting:
- ☆143Updated last year
- Abusing exceptions for code execution.☆111Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 10 months ago
- ☆71Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆105Updated 2 years ago
- Finding Truth in the Shadows☆92Updated 2 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆142Updated 9 months ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆88Updated 3 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆93Updated 7 months ago
- Minifilter Callback Patching Proof-of-Concept☆71Updated 2 years ago
- Windows KASLR bypass using prefetch side-channel☆98Updated last year
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆151Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆203Updated 3 weeks ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆245Updated 2 years ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- Writeups for CTF challenges☆31Updated last year
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆84Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆92Updated 4 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆227Updated 2 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- ☆111Updated 2 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆81Updated this week
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆117Updated 2 weeks ago
- ☆139Updated 2 weeks ago
- ☆145Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆89Updated 11 months ago
- ☆89Updated 3 months ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- ☆161Updated 3 years ago