tinysec / jswdLinks
javascript extension of windbg for hacker.
☆17Updated 2 years ago
Alternatives and similar repositories for jswd
Users that are interested in jswd are comparing it to the libraries listed below
Sorting:
- ☆32Updated 2 years ago
- Here I store my proof of concepts☆14Updated last year
- poc code for CVE-2024-38080☆29Updated last year
- A simple but useful project maybe help you reverse Windows.☆41Updated last year
- Static binary instrumentation for windows kernel drivers, to use with winafl☆78Updated 10 months ago
- ☆34Updated 8 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆98Updated last year
- Remove WPP calls from hexrays decompiled code☆54Updated 8 months ago
- Python bindings for BochsCPU☆37Updated 4 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆28Updated 6 months ago
- PyKD DLLs for x86 and x64 platforms☆17Updated 2 years ago
- Report and exploit of CVE-2023-36427☆88Updated 2 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- Overview of Microsoft Patch Tuesday☆14Updated last year
- Kernel Read Write Execute☆83Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆21Updated 3 months ago
- ☆37Updated last year
- ☆14Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated 2 months ago
- ☆41Updated 4 years ago
- ☆24Updated last year
- Security research helper for CLFS drivers☆14Updated last year
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆41Updated last week
- ☆30Updated 5 years ago
- Different tools for Microsoft Hyper-V researching☆63Updated last week
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- ☆58Updated last year
- V8sandbox_bypass using stack misalignment☆23Updated last year
- Analysis of the vulnerability☆50Updated last year