saibulusu / SMBIOS-Parser
Windows Command Line tool to parse the SMBIOS Table
☆19Updated 3 years ago
Alternatives and similar repositories for SMBIOS-Parser:
Users that are interested in SMBIOS-Parser are comparing it to the libraries listed below
- A poc that abuses Enclave☆37Updated 2 years ago
- ☆45Updated 4 years ago
- Disk based DMA for ATA and SCSI☆23Updated last year
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated last year
- ☆31Updated 4 years ago
- Static Library For Windows Drivers☆33Updated last month
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 2 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆68Updated last year
- Hacker Disassembler Engine - mirro☆18Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆42Updated 3 years ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆16Updated 2 years ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 3 years ago
- EFI bootkit for loading unsigned drivers☆17Updated 9 months ago
- Detect removed thread from PspCidTable.☆69Updated 3 years ago
- D☆42Updated 3 years ago
- c++ implementation of windows heavens gate☆68Updated 4 years ago
- Pure Hex-rays Decompiler Psudocode of various Windows 10 Mobile binaries, No edit have been done to the output, you will need to piece to…☆30Updated 3 years ago
- ☆24Updated last year
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 3 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆40Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆84Updated last year
- force delete runing .exe application file.or delete any locked file☆70Updated 2 years ago
- Debug Print viewer (user and kernel)☆65Updated last year
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆42Updated 6 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆84Updated last year