therealdreg / lldb_reversingLinks
Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.
☆14Updated last year
Alternatives and similar repositories for lldb_reversing
Users that are interested in lldb_reversing are comparing it to the libraries listed below
Sorting:
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- ☆94Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- ☆50Updated 6 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆113Updated 2 years ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆146Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆130Updated last month
- Windows KASLR bypass using prefetch side-channel☆131Updated last year
- Recon 2023 slides and code☆80Updated 2 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Virtual Trust Level (VTL 1) secure call tracing☆80Updated last month
- ☆83Updated 2 months ago
- Abusing exceptions for code execution.☆114Updated 2 years ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆124Updated this week
- uefi diskless persistence technique + OVMF secureboot bypass☆93Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 8 months ago
- How to retro theme your Ghidra☆35Updated this week
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆166Updated last month
- Exploitable drivers, you know what I mean☆153Updated 3 weeks ago
- Some of my windows kernel exploits for learning purposes☆131Updated 3 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆84Updated 7 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Updated 6 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- Rewrite and obfuscate code in compiled binaries☆259Updated this week
- A few examples of how to trap virtual memory access on Windows.☆34Updated 10 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆113Updated last year
- ☆89Updated 8 months ago
- Windows x64 kernel mode rootkit process hollowing POC.☆188Updated 2 years ago
- ☆114Updated 3 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆228Updated last week