yo-yo-yo-jbo / virtual_memory_known_dllsLinks
☆19Updated 2 years ago
Alternatives and similar repositories for virtual_memory_known_dlls
Users that are interested in virtual_memory_known_dlls are comparing it to the libraries listed below
Sorting:
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- ☆25Updated last year
- rpv-web is a browser based frontend for the rpv library☆26Updated 2 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Google Chrome Use After Free☆57Updated 3 years ago
- ☆31Updated 5 months ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- ☆47Updated 3 years ago
- ☆32Updated last year
- ☆49Updated 4 months ago
- CVE-2018-6066 using VBA☆66Updated 2 years ago
- ☆71Updated 2 years ago
- Code samples that serve as references for Windows API functions☆33Updated last year
- A few examples of how to trap virtual memory access on Windows.☆32Updated 7 months ago
- Inter-Process Communication Mechanisms☆28Updated 4 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 5 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆16Updated last year
- Slide of my conference presentations☆14Updated 11 months ago
- ☆71Updated 2 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 9 months ago
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆35Updated 2 months ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆33Updated 6 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆26Updated last month
- Recon 2023 slides and code☆79Updated 2 years ago
- ☆44Updated 2 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆94Updated 9 months ago