rwfpl / rewolf-gogogadgetView external linksLinks
kernel exploitation helper class
☆77Nov 26, 2016Updated 9 years ago
Alternatives and similar repositories for rewolf-gogogadget
Users that are interested in rewolf-gogogadget are comparing it to the libraries listed below
Sorting:
- ☆12Feb 19, 2017Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Mar 15, 2015Updated 10 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆141Apr 4, 2017Updated 8 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Event Tracing for Windows Custom Events☆21Jan 28, 2015Updated 11 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Windows过滤驱动-helloworld☆24Aug 27, 2015Updated 10 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- kernel space code☆12Jun 8, 2019Updated 6 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Aug 22, 2018Updated 7 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- modify binary Portable Executable to hook its export functions☆67Jan 13, 2019Updated 7 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆118Dec 1, 2023Updated 2 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆96Sep 26, 2016Updated 9 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- Simple tool to bundle windows DLLs with PE executable☆117Mar 13, 2015Updated 10 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆126Jan 15, 2019Updated 7 years ago
- User-mode hook bypassing method☆33Aug 26, 2016Updated 9 years ago
- Program to monitor Windows event (keyboard, mouse event, processes, memory, cpu, ...)☆34Nov 10, 2014Updated 11 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Apr 8, 2015Updated 10 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- ☆85Apr 17, 2020Updated 5 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago