trailofbits / WinDbg-JS
☆24Updated last year
Alternatives and similar repositories for WinDbg-JS
Users that are interested in WinDbg-JS are comparing it to the libraries listed below
Sorting:
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- Extract data of TTD trace file to a minidump☆28Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 3 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- ☆18Updated 4 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated 10 months ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- A small tool to unmap PE memory dumps.☆11Updated last year
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- ☆30Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆54Updated this week
- Uses ghidra to find all ETW write metadata for each API in a PE file☆17Updated 9 months ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆77Updated last year
- Windows kernel PDB data parsed into YAML☆36Updated 6 months ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆36Updated 4 months ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆28Updated 2 years ago
- ☆25Updated 2 years ago
- Inter-Process Communication Mechanisms☆26Updated 4 years ago
- ☆84Updated 11 months ago
- Process Injection without R/W target memory and without creating a remote thread☆18Updated 3 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆28Updated 2 years ago
- really ?☆12Updated last year
- ☆25Updated 6 months ago
- The Console Monitor Driver is a KMDF kernel-mode filter driver that captures certain Fast I/O operations (input and output) that is sent …☆39Updated 2 years ago