therealdreg / lldb_reversingLinks
Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.
☆14Updated last year
Alternatives and similar repositories for lldb_reversing
Users that are interested in lldb_reversing are comparing it to the libraries listed below
Sorting:
- ☆52Updated 8 months ago
- ☆93Updated last year
- Virtual Trust Level (VTL 1) secure call tracing☆83Updated 3 months ago
- Windows KASLR bypass using prefetch side-channel☆172Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆147Updated last year
- Payload Obfuscation for Red Teams workshop materials☆78Updated 3 weeks ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆86Updated last month
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Updated 8 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆134Updated 2 months ago
- Report and exploit of CVE-2024-21305.☆38Updated last year
- Finding Truth in the Shadows☆119Updated 2 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆237Updated 2 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- ☆84Updated 4 months ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆49Updated last month
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Updated 8 months ago
- A Proof-of-Concept implementation of Reflective DLL Injection (RDI) specifically for Windows on ARM64. Demonstrates PEB access via the x1…☆31Updated 6 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆125Updated 2 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆162Updated 2 weeks ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Updated 2 years ago
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 9 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆98Updated last year