sam-b / windows_kernel_address_leaks
Examples of leaking Kernel Mode information from User Mode on Windows
☆587Updated 7 years ago
Alternatives and similar repositories for windows_kernel_address_leaks:
Users that are interested in windows_kernel_address_leaks are comparing it to the libraries listed below
- Windows NT x64 syscall fuzzer☆594Updated last year
- Windows Kernel Drivers fuzzer☆306Updated 7 years ago
- Research on Windows Kernel Executive Callback Objects☆284Updated 4 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆389Updated 5 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆426Updated 6 years ago
- ☆392Updated 7 years ago
- My notes while studying Windows internals☆408Updated 2 months ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆358Updated 5 years ago
- A bunch of JavaScript extensions for WinDbg.☆327Updated 2 months ago
- Extract Windows Defender database from vdm files and unpack it☆435Updated 5 years ago
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆314Updated 10 months ago
- My personal cheat sheet for using WinDbg for kernel debugging☆405Updated 4 months ago
- Official x64dbg plugin for IDA Pro.☆483Updated 4 months ago
- Tools for instrumenting Windows Defender's mpengine.dll☆293Updated 6 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆575Updated 3 weeks ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆592Updated 2 years ago
- WinDBG Anti-RootKit Extension☆626Updated 4 years ago
- Dump of win32k POCs for bugs I've found☆370Updated 2 years ago
- The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracke…☆370Updated last month
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆851Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆396Updated 4 years ago
- Obfuscate specific windows apis with different apis☆993Updated 4 years ago
- A small bootkit which does not rely on x64 assembly.☆469Updated 5 years ago
- Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.☆822Updated 9 months ago
- Have fun with the LowFragmentationHeap☆235Updated 4 years ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆541Updated 3 weeks ago
- windows syscall table from xp ~ 10 rs4☆351Updated 6 years ago
- Quickly debug shellcode extracted during malware analysis☆582Updated last year
- awesome-windows-security-development☆169Updated 6 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆389Updated 3 years ago