shareef12 / driveranalyzerLinks
Binary Ninja plugin to perform automated analysis of Windows drivers
☆17Updated 5 years ago
Alternatives and similar repositories for driveranalyzer
Users that are interested in driveranalyzer are comparing it to the libraries listed below
Sorting:
- AMD SVM hypervisor rootkit proof of concept☆45Updated last year
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆35Updated last year
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- ☆45Updated 4 years ago
- Playing with LLVM passes☆36Updated last year
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆32Updated last year
- LLVM based devirtualization PoC’s.☆20Updated 3 years ago
- ☆16Updated 2 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Binary Ninja plugin for automating VMProtect analysis☆60Updated 2 years ago
- PDB Rewriting Rust Library☆24Updated last year
- A driver to implement IOCTL hooking☆25Updated 3 years ago
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆20Updated 6 months ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 3 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆60Updated 10 months ago
- ☆29Updated 3 years ago
- Python bindings for BochsCPU☆36Updated 2 weeks ago
- Currently proof-of-concept☆17Updated 3 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- ☆40Updated 3 years ago
- ☆28Updated 5 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- ☆14Updated 3 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 4 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆72Updated 5 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- A minimalistic logger for Windows Kernel Drivers.☆23Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆23Updated 10 months ago