ufrisk / presentationsLinks
Conference Presentations
☆44Updated 5 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- System Management RAM analysis tool☆79Updated 10 months ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 8 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago
- ☆50Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Intel pin tools☆19Updated 8 years ago
- Open Source Rootkit☆22Updated 7 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- ☆30Updated 9 years ago
- Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applications☆36Updated 12 years ago
- ☆16Updated 2 years ago
- Thunderclap QEMU-based network card emulation☆27Updated 2 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21Updated 10 years ago
- ☆34Updated 3 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- ☆24Updated 9 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆55Updated 13 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- ☆27Updated 3 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆22Updated 4 years ago