trailofbits / flying-sandbox-monster
Sandboxed, Rust-based, Windows Defender Client
☆178Updated 7 years ago
Alternatives and similar repositories for flying-sandbox-monster:
Users that are interested in flying-sandbox-monster are comparing it to the libraries listed below
- AppJailLauncher in Rust☆109Updated 3 years ago
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆367Updated 6 years ago
- ☆85Updated 8 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆133Updated 6 years ago
- Hypervisor-based debugger☆187Updated 4 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- ☆173Updated 2 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆135Updated 8 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆185Updated 5 years ago
- Implementation of the SMM rootkit "The Watcher"☆126Updated 3 years ago
- LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger☆217Updated 4 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆375Updated 6 years ago
- grap: define and match graph patterns within binaries☆170Updated 4 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- a bare metal (type 1) VMM (hypervisor) with a python remote control API☆182Updated 7 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 8 months ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- The history of Windows Internals via symbols.☆176Updated 3 years ago
- a Japanese food keeps you sane☆119Updated 9 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 8 years ago
- windows syscall table from xp ~ 10 rs4☆353Updated 6 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆162Updated 6 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆433Updated 6 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- PC firmware exploitation tool and library☆253Updated 2 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- A program to draw rectangles from heap traces.☆133Updated 5 years ago