Interactive CTF Exploration Tool
-
Updated
Sep 17, 2021 - C
Interactive CTF Exploration Tool
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
UltimateAnticheat is an open source usermode anti-cheat system made to detect and prevent common attack vectors in game cheating (C++, Windows)
My notes while studying Windows internals
The history of Windows Internals via symbols.
An example of a client and server using Windows' ALPC functions to send and receive data.
Windows 10 PE image loader (LDR) NTDLL component toolbox
An example of how to use Microsoft Windows Warbird technology
Dump syscall numbers from ntdll.dll
Reversing and recreating the Windows 10 image loader (usermode, x86)
Solutions to Windows Kernel Programming exercises by Pavel Yosifovich
SSN parser/extractor for AV/EDR evasion
Implementing NtCreateUserProcess with Indirect Syscalls Technique.
Add a description, image, and links to the windows-internals topic page so that developers can more easily learn about it.
To associate your repository with the windows-internals topic, visit your repo's landing page and select "manage topics."