waleedassar / SimpleNTSyscallFuzzerLinks
☆145Updated last year
Alternatives and similar repositories for SimpleNTSyscallFuzzer
Users that are interested in SimpleNTSyscallFuzzer are comparing it to the libraries listed below
Sorting:
- Windows KASLR bypass using prefetch side-channel☆102Updated last year
- ☆70Updated 2 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆75Updated 4 months ago
- Unofficial Common Log File System (CLFS) Documentation☆179Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆206Updated last month
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆25Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆228Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆89Updated 3 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆94Updated 8 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆117Updated last month
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆99Updated this week
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆186Updated last month
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆116Updated last year
- ☆76Updated 3 months ago
- ☆145Updated 2 years ago
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆104Updated last week
- ☆74Updated 11 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- This repo contains EXPs about Vulnerable Windows Driver☆46Updated last year
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆152Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆125Updated last week
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆208Updated 4 years ago
- ☆18Updated 11 months ago
- ☆33Updated last year
- Report and exploit of CVE-2023-36427☆90Updated last year
- An intuitive query API for IDA Pro☆157Updated 3 months ago
- Writeups for CTF challenges☆31Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Hex-Rays Block Highlighter plugin for IDA to highlight if/for/do/switch/while blocks☆61Updated 3 years ago
- PyKD DLLs for x86 and x64 platforms☆17Updated last year