rwfpl / rewolf-gogogadgetLinks
kernel exploitation helper class
☆77Updated 8 years ago
Alternatives and similar repositories for rewolf-gogogadget
Users that are interested in rewolf-gogogadget are comparing it to the libraries listed below
Sorting:
- ☆35Updated 9 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- ☆35Updated 7 years ago
- ☆39Updated 4 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- ☆91Updated 6 years ago
- ☆91Updated 8 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆65Updated 10 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Updated 10 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Collection of pin tools☆52Updated 9 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆65Updated 7 years ago
- Analysis PE file or Shellcode☆49Updated 9 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- ☆26Updated 9 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- ☆33Updated 8 years ago
- A fuzz job for ClamAV☆31Updated 9 years ago
- An implementation of a generic unpacker based on Intel PIN☆28Updated 9 years ago