renorobert / slatmmuView external linksLinks
☆11Jul 25, 2020Updated 5 years ago
Alternatives and similar repositories for slatmmu
Users that are interested in slatmmu are comparing it to the libraries listed below
Sorting:
- ☆13Jul 31, 2020Updated 5 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- The Dumb Network Fuzzer☆20Jul 18, 2023Updated 2 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- Experiments involving the Windows Hypervisor Platform☆23Jun 24, 2020Updated 5 years ago
- LLDB based debugger for Linux Kernel☆28Apr 5, 2025Updated 10 months ago
- Download all of Microsoft's security updates and symbols☆41Mar 31, 2016Updated 9 years ago
- IDA Plugin - GraphSlick☆55Nov 20, 2014Updated 11 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- ☆29Mar 9, 2024Updated last year
- ☆26Mar 12, 2020Updated 5 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 7 years ago
- Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries…☆28Apr 23, 2021Updated 4 years ago
- Get actually nice HTML coverage overview on libfuzzer runs☆31Apr 21, 2023Updated 2 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆73Mar 13, 2024Updated last year
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- A coverage-based software testing tool☆34Dec 11, 2020Updated 5 years ago
- ☆74Aug 12, 2020Updated 5 years ago
- Report and exploit of CVE-2024-21305.☆38Jan 14, 2024Updated 2 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Kernel Test Framework☆150Nov 25, 2025Updated 2 months ago
- ☆35Sep 18, 2015Updated 10 years ago
- A branch-monitor-based solution for process monitoring.☆136Feb 9, 2020Updated 6 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Mar 30, 2020Updated 5 years ago
- Zyrox: LLVM based, compile-time obfuscator plugin.☆88Feb 1, 2026Updated 2 weeks ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated last month
- Exploit POC for CVE-2024-36877☆48Aug 14, 2024Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Android based APT exploitation framework☆36Jul 20, 2015Updated 10 years ago