tsarpaul / RpcEnumIDA
XPN's RpcEnum but based on IDA instead of Ghidra
☆21Updated 5 years ago
Alternatives and similar repositories for RpcEnumIDA:
Users that are interested in RpcEnumIDA are comparing it to the libraries listed below
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- KernelBugTest☆15Updated 6 years ago
- 一些研究☆14Updated 5 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆15Updated 5 years ago
- Easily hook WIN32 x64 functions☆18Updated this week
- ☆13Updated 3 years ago
- ☆11Updated 4 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- ☆19Updated 5 years ago
- Currently proof-of-concept☆16Updated 3 years ago
- ☆18Updated 6 years ago
- Green shellcode challenge tools☆22Updated 5 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆15Updated last year
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- API logger plugin for Intel Pintool☆14Updated 7 years ago
- ☆33Updated 2 years ago
- ☆12Updated 3 years ago
- prebuild angr wheels for Windows on x86_64☆13Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- ☆12Updated 7 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 9 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆34Updated 3 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- Malware analysis tool based on taint analysis.☆14Updated 3 years ago
- Code injection via delay load libraries☆34Updated 7 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆25Updated 6 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago