shareef12 / driveranalyzerLinks
Binary Ninja plugin to perform automated analysis of Windows drivers
☆17Updated 5 years ago
Alternatives and similar repositories for driveranalyzer
Users that are interested in driveranalyzer are comparing it to the libraries listed below
Sorting:
- AMD SVM hypervisor rootkit proof of concept☆47Updated last year
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- LLVM based devirtualization PoC’s.☆21Updated 3 years ago
- ☆21Updated 4 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆35Updated last year
- Playing with LLVM passes☆36Updated last year
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆33Updated last year
- ☆46Updated 5 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆60Updated 11 months ago
- ☆29Updated 3 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Extract data of TTD trace file to a minidump☆28Updated last year
- clone of armadillo patched for windows☆47Updated 8 months ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Windows Minidump loader for Ghidra☆29Updated 2 years ago
- SPI flash read MitM attack PoC☆38Updated 3 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 4 years ago
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆34Updated last year
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆60Updated 10 months ago
- ☆29Updated 4 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- ☆43Updated 3 years ago
- ☆16Updated 2 years ago
- ☆14Updated 3 years ago
- ☆21Updated 6 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- ☆40Updated 4 years ago