wdnmd's repositories
AL_Kernel_driver_hack
Android/Linux Kernel dirver read and write memory.
Android_Native_Surface
安卓c++绘制和录屏
blacksun-framework
blacksun framework for QEMU/KVM game cheat development
Clash.Meta
A rule-based tunnel in Go.
cve-2023-29360
Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
drivers-binaries
Exploitable drivers, you know what I mean
find_load_module
本工具用于在无Linux内核源码的情况下,查找出内核函数load_module的位置,确保在无内核源码的情况下,顺利去除所有加载驱动的验证,此工具适用于所有Linux ARM64内核
Genymotion_A11_libhoudini
Genymotion ARM, ARMv7, ARMv8/ARM64 Translation for Android 11
gzip-js-injector
GZIP 页面零开销注入 JS 演示
HPHardwareDiagnostics-PoC
PoC exploit for HP Hardware Diagnostic's EtdSupp driver
HyperHide
Hypervisor based anti anti debug plugin for x64dbg
Kernel-Cheat-for-directx3D
windows krnl cheat for hook dxgkrnl.sys
lolbin-poc
Small PoC of using a Microsoft signed executable as a lolbin.
MagiskPatchAction
Use GitHub Actions to patch your boot.img/init_boot.img and upload them to the Releases section
marlin_touch_set_input
通过模拟触摸屏控制器驱动来实现手机点击,滑动操作
nullmap
Using CVE-2023-21768 to manual map kernel mode driver
op2
Windows消息模拟,gdi,dx,opengl截图,找图,找字(OCR)
RWXAbusing
RWX Section Abusing
SDA
SDA is a rich cross-platform tool for reverse engineering that focused firstly on analysis of computer games. I'm trying to create a mix of the Ghidra, Cheat Engine and x64dbg. My tool will combine static and dynamic analysis of programs. Now SDA is being developed.
sperm
浏览过的精彩逆向文章汇总,值得一看
TestSigningModeFucker
TS-Fucker - Forces the machine in/out of TestSigning Mode at runtime.
veh_hooking
x64/x86 Function Hooking through VectoredExceptionHandler (PAGE_GUARD method)
WinDbg_Scripts
Useful scripts for WinDbg using the debugger data model
Windows-10-22H2-Vulnerable-driver-communication
Allocate memory in the kernel & r/w control registers with a vulnerable driver.
x64-Page-Walker
Walks through the 4-level paging structures in Windows x64