Pinned Repositories
ALPC-Example
An example of a client and server using Windows' ALPC functions to send and receive data.
CallMon
CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers
CVE-2018-16712
PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)
CVE-Stockpile
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
DynamicKernelShellcode
An example of how x64 kernel shellcode can dynamically find and use APIs
HyperCalc
An Intel HAXM powered, protected mode, 32 bit, hypervisor addition calculator, written in Rust.
KLoad_C
A simple command line utility to quickly load and unload Windows drivers
WarbirdExamples
An example of how to use Microsoft Windows Warbird technology
WhoCalls_C
WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit (PE) and 64-bit (PE32+) file formats (.exe, .dll, .sys)
WHPHook
Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection at the hypervisor level
DownWithUp's Repositories
DownWithUp/CallMon
CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers
DownWithUp/DynamicKernelShellcode
An example of how x64 kernel shellcode can dynamically find and use APIs
DownWithUp/ALPC-Example
An example of a client and server using Windows' ALPC functions to send and receive data.
DownWithUp/CVE-Stockpile
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
DownWithUp/CVE-2018-16712
PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)
DownWithUp/WarbirdExamples
An example of how to use Microsoft Windows Warbird technology
DownWithUp/WhoCalls_C
WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit (PE) and 64-bit (PE32+) file formats (.exe, .dll, .sys)
DownWithUp/KLoad_C
A simple command line utility to quickly load and unload Windows drivers
DownWithUp/WinPools
WinPools is an example of how Windows kernel big pool addresses can be leaking using NtQuerySystemInformation
DownWithUp/WHPHook
Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection at the hypervisor level
DownWithUp/DbgKeystone
A keystone engine powered Windows Debugger extension
DownWithUp/KLoad
A simple command line utility to quickly load and unload Windows drivers
DownWithUp/FakeDriverPoC
This is a PoC driver which creates a fake driver and device object with the intent on allowing a user mode program to communicate with a "fake" driver and device.
DownWithUp/CVE-2018-16713
PoC code for CVE-2018-16713 (exploit by rdmsr)
DownWithUp/CVE-2018-18026
PoC Code for CVE-2018-18026 (exploit by stack overflow)
DownWithUp/CVE-2018-18714
PoC Code for CVE-2018-18714 (exploit by stack overflow)
DownWithUp/soplock
The Simple Opportunistic Lock tool
DownWithUp/HyperCalc
An Intel HAXM powered, protected mode, 32 bit, hypervisor addition calculator, written in Rust.
DownWithUp/SHA-ME
A pure WinAPI program that demonstrates translating a file into a SHA-256 hash. Designed to be used as a utility.
DownWithUp/Spoof-Task-Manager
An example showing how a mutex can stop taskmgr.exe from loading
DownWithUp/The-Good-Bad-Code
Pushing the limits of bad programming practices. Abusing APIs. Destroying utility programs.
DownWithUp/wat
The Linux coreutils spin off of cat, but for Windows.
DownWithUp/Driver-Easy-Research
Python scripts for manipulating Driver Easy's servers
DownWithUp/SystemsWork
A repo containing examples relating to various aspects of Windows internals and processor features
DownWithUp/bswap
A Windbg extension for swapping byte endianness.
DownWithUp/downwithup.github.io
Personal website
DownWithUp/mkit
Simple file hiding kernel rootkit for Linux v6
DownWithUp/speakeasy
Windows kernel and user mode emulation.
DownWithUp/WhoCalls
A program which can query a directory of files, find the binaries, and search for a specified Win API import.
DownWithUp/windbg2ida
Windbg2ida lets you dump each step in Windbg then shows these steps in IDA