Enumerate user mode shared memory mappings on Windows.
☆128Feb 14, 2021Updated 5 years ago
Alternatives and similar repositories for sic
Users that are interested in sic are comparing it to the libraries listed below
Sorting:
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆243Jul 7, 2021Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- ☆14Mar 8, 2019Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆38Oct 21, 2020Updated 5 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- The Win32 Anti-Intrusion Library☆213May 30, 2019Updated 6 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆435Aug 16, 2023Updated 2 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- ☆68Dec 17, 2020Updated 5 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- Sysmon shenanigans☆66Oct 9, 2020Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆240Nov 6, 2019Updated 6 years ago
- A fast execution trace symbolizer for Windows.☆130May 6, 2024Updated last year
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- A research project about Windows notify routines.☆38Jul 31, 2020Updated 5 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- A DTrace on Windows Reimplementation☆372Feb 3, 2026Updated last month
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- Hypervisor based tool for monitoring system register accesses.☆154Sep 13, 2018Updated 7 years ago
- Advanced driver monitoring utility.☆219Jul 13, 2022Updated 3 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Jan 15, 2021Updated 5 years ago
- Hyper-V Research is trendy now☆181Feb 21, 2026Updated last week
- System call hook for Windows 10 20H1☆497Jun 26, 2021Updated 4 years ago
- A Windows kernel dump C++ parser library with Python 3 bindings.☆213Oct 5, 2025Updated 4 months ago
- ☆39Oct 29, 2020Updated 5 years ago
- ☆156Oct 29, 2019Updated 6 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Simple driver to register all available process, thread, image, Registry, and Object callbacks☆124Oct 5, 2017Updated 8 years ago
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 3 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago
- Reverse engineered source code of the autochk rootkit☆210Nov 1, 2019Updated 6 years ago
- ☆33Dec 22, 2020Updated 5 years ago