anti-ransomware file-system filter
☆69Sep 3, 2024Updated last year
Alternatives and similar repositories for RansomGuard
Users that are interested in RansomGuard are comparing it to the libraries listed below
Sorting:
- research revolving the windows filtering platform callout mechanism☆39May 26, 2024Updated last year
- Example of building an application verifer DLL☆51Jun 1, 2024Updated last year
- ☆18Mar 28, 2023Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- Async rust support for the reverse-engineered Crowdstrike Falcon protocol between the Sensor and cloud services☆17Mar 10, 2023Updated 2 years ago
- a windows kernel keylogger that works☆20Feb 12, 2024Updated 2 years ago
- ☆181Apr 24, 2025Updated 10 months ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- MSI creator for exe setup/installer☆11Jun 27, 2023Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated last year
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆169May 17, 2023Updated 2 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆118May 29, 2025Updated 9 months ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆36Jan 12, 2022Updated 4 years ago
- ☆252Jun 7, 2025Updated 8 months ago
- Python tool to check rootkits in Windows kernel☆207Aug 20, 2025Updated 6 months ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆43Jun 10, 2025Updated 8 months ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Jun 30, 2023Updated 2 years ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆359Aug 11, 2024Updated last year
- Collect Windows telemetry for Maldev☆460Jan 30, 2026Updated last month
- Load Dll into Kernel space☆40Aug 23, 2022Updated 3 years ago
- Document ETW providers☆271Mar 28, 2020Updated 5 years ago
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆96Aug 26, 2025Updated 6 months ago
- Windows user mini-dump helper library to extract data from it.☆13May 17, 2025Updated 9 months ago
- ☆12Jun 30, 2019Updated 6 years ago
- pdb downloader☆31Feb 27, 2024Updated 2 years ago
- Sample for Creating a new kernel object type and supporting API☆27Sep 7, 2024Updated last year
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆87May 17, 2023Updated 2 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆242Sep 26, 2023Updated 2 years ago
- Remote Thread Detection with a Kernel Driver☆34Jan 14, 2025Updated last year
- Exploit POC for CVE-2024-36877☆48Aug 14, 2024Updated last year
- 正确解析 _HEAP_VS_***符号 ,支持在最新win11 24h2 运行,替换windbg自带的!pool命令☆17Nov 30, 2024Updated last year
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- wfp2socks☆11Sep 11, 2025Updated 5 months ago
- ☆147Oct 29, 2024Updated last year