ufrisk / kaslrfinderLinks
Kernel Address Space Layout Randomization (KASLR) Recovery Software
☆98Updated 8 years ago
Alternatives and similar repositories for kaslrfinder
Users that are interested in kaslrfinder are comparing it to the libraries listed below
Sorting:
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Updated 11 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- ☆35Updated 9 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Updated 8 years ago
- ☆91Updated 8 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆92Updated 9 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago
- ☆50Updated 8 years ago
- Programmatic disassembly and patching☆68Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆77Updated 7 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆111Updated last year
- ☆69Updated 3 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Updated 9 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆132Updated 10 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- ☆91Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆65Updated 10 years ago
- Runtime Prevention of Return-Oriented Programming Attacks☆81Updated 10 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago
- Hypervisor-based debugger☆189Updated 4 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆135Updated 9 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- A search tool for IDA☆70Updated 8 years ago