sogeti-esec-lab / LKDView external linksLinks
Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll
☆92Aug 22, 2016Updated 9 years ago
Alternatives and similar repositories for LKD
Users that are interested in LKD are comparing it to the libraries listed below
Sorting:
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Mar 15, 2015Updated 10 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- ☆12Feb 19, 2017Updated 8 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 11 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Apr 8, 2015Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- a Japanese food keeps you sane☆119Aug 22, 2015Updated 10 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Mar 2, 2017Updated 8 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆118Dec 1, 2023Updated 2 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Dec 8, 2015Updated 10 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- ☆42May 10, 2016Updated 9 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- IDATACO IDA Pro Plugin☆45Jun 14, 2016Updated 9 years ago
- ☆10Mar 30, 2016Updated 9 years ago