therealdreg / lldb_reversingLinks
Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.
☆14Updated last year
Alternatives and similar repositories for lldb_reversing
Users that are interested in lldb_reversing are comparing it to the libraries listed below
Sorting:
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- ☆95Updated last year
- Virtual Trust Level (VTL 1) secure call tracing☆81Updated 2 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- ☆51Updated 7 months ago
- Recon 2023 slides and code☆80Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆35Updated 10 months ago
- Windows KASLR bypass using prefetch side-channel☆144Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆132Updated 3 weeks ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆60Updated last week
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆38Updated last year
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Updated 7 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆67Updated 8 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆146Updated last year
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆124Updated 3 weeks ago
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- Exploitable drivers, you know what I mean☆153Updated last month
- ☆72Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 7 months ago
- ☆90Updated 9 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated 2 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Updated 3 weeks ago
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- Report and exploit of CVE-2023-36427☆89Updated last year
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- Writeups for CTF challenges☆33Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆159Updated last month
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆98Updated 5 months ago