therealdreg / lldb_reversingLinks
Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.
☆14Updated last year
Alternatives and similar repositories for lldb_reversing
Users that are interested in lldb_reversing are comparing it to the libraries listed below
Sorting:
- Virtual Trust Level (VTL 1) secure call tracing☆42Updated this week
- ☆92Updated last year
- Rewrite and obfuscate code in compiled binaries☆223Updated last week
- Exploitable drivers, you know what I mean☆154Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆128Updated 2 months ago
- Recon 2023 slides and code☆79Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆118Updated last year
- ☆49Updated 5 months ago
- A few examples of how to trap virtual memory access on Windows.☆33Updated 8 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆125Updated 2 years ago
- Finding Truth in the Shadows☆116Updated 2 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆89Updated last year
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆220Updated last month
- bypassing intel txt's tboot integrity checks via coreboot shim☆80Updated 5 months ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆152Updated 3 weeks ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆232Updated 3 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆156Updated this week
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆108Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆94Updated 10 months ago
- Report and exploit of CVE-2024-21305.☆36Updated last year
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆13Updated 5 months ago
- Windows x64 kernel mode rootkit process hollowing POC.☆188Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 6 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆67Updated 4 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆121Updated 3 months ago
- A universal binary patching dll.☆92Updated 10 months ago
- Windows KASLR bypass using prefetch side-channel☆120Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆214Updated last year
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago