zeze-zeze / ioctlanceLinks
A tool that is used to hunt vulnerabilities in x64 WDM drivers
☆202Updated 2 months ago
Alternatives and similar repositories for ioctlance
Users that are interested in ioctlance are comparing it to the libraries listed below
Sorting:
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆228Updated 2 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆152Updated last year
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆153Updated 3 months ago
- Static Binary Instrumentation tool for Windows x64 executables☆206Updated last month
- ☆145Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆206Updated 7 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆143Updated 10 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆144Updated 2 years ago
- Single header version of System Informer's phnt library.☆223Updated this week
- Unofficial Common Log File System (CLFS) Documentation☆179Updated 3 years ago
- compile-time control flow obfuscation using mba☆183Updated last year
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆369Updated 8 months ago
- Windows KASLR bypass using prefetch side-channel☆102Updated last year
- Debugger Anti-Detection Benchmark☆334Updated last year
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆117Updated last month
- ☆145Updated 2 years ago
- Helpful WinDBG command for kernel debugging☆23Updated 4 years ago
- ☆199Updated last year
- An x86-64 Code Virtualizer☆267Updated 8 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆248Updated 2 years ago
- Native code virtualizer for x64 binaries☆486Updated 6 months ago
- ☆70Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆89Updated 3 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆210Updated 3 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆186Updated last month
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆280Updated 2 years ago
- ☆18Updated 11 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆290Updated last year
- Collection of hypervisor detections☆239Updated 8 months ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆219Updated 5 years ago