yardenshafir / cet-researchView external linksLinks
A collection of tools, source code, and papers researching Windows' implementation of CET.
☆88Oct 6, 2020Updated 5 years ago
Alternatives and similar repositories for cet-research
Users that are interested in cet-research are comparing it to the libraries listed below
Sorting:
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Finding Truth in the Shadows☆120Jan 26, 2023Updated 3 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- APC Internals Research Code☆167Jun 28, 2020Updated 5 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆130May 17, 2023Updated 2 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆18Apr 16, 2022Updated 3 years ago
- ☆24Jul 15, 2023Updated 2 years ago
- .lib file for linking against the NT CRT☆18Mar 18, 2022Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆265Aug 31, 2022Updated 3 years ago
- Application Verifier Dynamic Fault Injection☆40Jan 12, 2026Updated last month
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆197Dec 6, 2022Updated 3 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Sep 18, 2020Updated 5 years ago
- Lua in kernel-mode because why not.☆367Dec 3, 2021Updated 4 years ago
- ☆71Feb 6, 2025Updated last year
- ☆163Sep 18, 2021Updated 4 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆247Jul 5, 2022Updated 3 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Aug 3, 2023Updated 2 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆483May 18, 2021Updated 4 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- An example code of CiGetCertPublisherName☆17Mar 24, 2022Updated 3 years ago
- The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by W…☆404Apr 27, 2023Updated 2 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago
- A small bootkit which does not rely on x64 assembly.☆510Aug 29, 2019Updated 6 years ago
- A DTrace on Windows Reimplementation☆369Feb 3, 2026Updated last week
- Debug Print viewer (user and kernel)☆71Feb 7, 2024Updated 2 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- ☆132Oct 2, 2024Updated last year
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- A WinDbg extension to trace COM interactions☆131Aug 14, 2025Updated 6 months ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆643Jan 28, 2025Updated last year
- A Simple Example☆23Nov 30, 2018Updated 7 years ago