therealdreg / lldb_reversingLinks
Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.
☆14Updated last year
Alternatives and similar repositories for lldb_reversing
Users that are interested in lldb_reversing are comparing it to the libraries listed below
Sorting:
- Virtual Trust Level (VTL 1) secure call tracing☆83Updated 3 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆86Updated last month
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Updated 8 months ago
- ☆84Updated 3 months ago
- ☆51Updated 8 months ago
- Recon 2023 slides and code☆80Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- ☆95Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆147Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Abusing exceptions for code execution.☆113Updated 2 years ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆134Updated last month
- Exploitable drivers, you know what I mean☆154Updated 3 weeks ago
- Aplos an extremely simple fuzzer for Windows binaries.☆67Updated 9 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆125Updated last month
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆235Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆168Updated last year
- A few examples of how to trap virtual memory access on Windows.☆37Updated 11 months ago
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- Writeups for CTF challenges☆33Updated 2 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- Repo with different exploits & PoCs☆65Updated 6 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- Rewrite and obfuscate code in compiled binaries☆267Updated last month
- ☆24Updated last year
- Finding Truth in the Shadows☆119Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆38Updated last year