trailofbits / WinDbg-JS
☆24Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for WinDbg-JS
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆24Updated last year
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆49Updated last year
- Small tool to play with IOCs caused by Imageload events☆37Updated last year
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Local OXID Resolver (LCLOR) : Research and Tooling☆33Updated 3 years ago
- ☆17Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆46Updated last year
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated 7 months ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆44Updated 4 years ago
- Enabled / Disable LSA Protection via BYOVD☆62Updated 2 years ago
- ☆27Updated last year
- ☆84Updated 5 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆30Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆39Updated 3 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆93Updated last year
- Finding Truth in the Shadows☆84Updated last year
- ☆98Updated 2 years ago
- ☆27Updated 2 years ago
- A PoC for adding NtContinue to CFG allowed list in order to make Ekko work in a CFG protected process☆87Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆94Updated 4 years ago
- Piece of code to detect and remove hooks in IAT☆58Updated 2 years ago
- ☆27Updated 4 months ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆39Updated 2 months ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆31Updated 3 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last month
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆20Updated 2 years ago
- A small tool to unmap PE memory dumps.☆11Updated last year