Curated reference links from dobin/AwesomeMalDevLinks
Relevant research for improving Cthaeh's detection capabilities. Links organized by what they teach us.
Driver Reversing Methodology
Exploit Techniques (patterns to detect)
Automated Analysis Tools
BYOVD & DSE Bypass
Real-World Exploits (for test cases)
PatchGuard & Kernel Internals
Key Takeaway for Cthaeh
The Humanativa article on Ghidra + Semgrep is particularly interesting - they use Semgrep rules on decompiled output. Could be a Stage 2 enhancement: export Ghidra decompilation, run Semgrep vuln patterns against it.
Not an implementation issue
This is a reference collection. Link to specific issues (#7-#12) for implementations.
Curated reference links from dobin/AwesomeMalDevLinks
Relevant research for improving Cthaeh's detection capabilities. Links organized by what they teach us.
Driver Reversing Methodology
Exploit Techniques (patterns to detect)
Automated Analysis Tools
BYOVD & DSE Bypass
Real-World Exploits (for test cases)
PatchGuard & Kernel Internals
Key Takeaway for Cthaeh
The Humanativa article on Ghidra + Semgrep is particularly interesting - they use Semgrep rules on decompiled output. Could be a Stage 2 enhancement: export Ghidra decompilation, run Semgrep vuln patterns against it.
Not an implementation issue
This is a reference collection. Link to specific issues (#7-#12) for implementations.