Skip to content

research: Reference links from AwesomeMalDevLinks for driver vuln hunting #13

@jeffaf

Description

@jeffaf

Curated reference links from dobin/AwesomeMalDevLinks

Relevant research for improving Cthaeh's detection capabilities. Links organized by what they teach us.

Driver Reversing Methodology

Exploit Techniques (patterns to detect)

Automated Analysis Tools

BYOVD & DSE Bypass

Real-World Exploits (for test cases)

PatchGuard & Kernel Internals

Key Takeaway for Cthaeh

The Humanativa article on Ghidra + Semgrep is particularly interesting - they use Semgrep rules on decompiled output. Could be a Stage 2 enhancement: export Ghidra decompilation, run Semgrep vuln patterns against it.

Not an implementation issue

This is a reference collection. Link to specific issues (#7-#12) for implementations.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions