Enumerate user mode shared memory mappings on Windows.
☆134Feb 14, 2021Updated 5 years ago
Alternatives and similar repositories for sic
Users that are interested in sic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analysing and defeating PatchGuard universally☆35Nov 4, 2020Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆38Oct 21, 2020Updated 5 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- Sysmon shenanigans☆66Oct 9, 2020Updated 5 years ago
- ☆14Mar 8, 2019Updated 7 years ago
- A fast execution trace symbolizer for Windows.☆130May 6, 2024Updated last year
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- ☆69Dec 17, 2020Updated 5 years ago
- System call hook for Windows 10 20H1☆495Jun 26, 2021Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- A DTrace on Windows Reimplementation☆372Mar 12, 2026Updated last week
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆241Nov 6, 2019Updated 6 years ago
- The Win32 Anti-Intrusion Library☆213May 30, 2019Updated 6 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆434Aug 16, 2023Updated 2 years ago
- ☆156Oct 29, 2019Updated 6 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- Simple driver loader for windows☆18May 22, 2020Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆140Aug 23, 2022Updated 3 years ago
- Personal curation of Clang/LLVM patches.☆12Feb 27, 2021Updated 5 years ago
- Advanced driver monitoring utility.☆219Mar 7, 2026Updated 2 weeks ago
- Research on Windows Kernel Executive Callback Objects☆316Feb 22, 2020Updated 6 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Jul 1, 2019Updated 6 years ago
- c++ implementation of windows heavens gate☆71Feb 12, 2021Updated 5 years ago
- init☆14Mar 16, 2020Updated 6 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆74Oct 28, 2019Updated 6 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆51Jan 15, 2021Updated 5 years ago
- Virtual Machine Introspection, Tracing & Debugging☆597Feb 22, 2022Updated 4 years ago
- Static Library For Windows Drivers☆41Dec 13, 2025Updated 3 months ago
- Reverse engineered source code of the autochk rootkit☆210Nov 1, 2019Updated 6 years ago
- A Windows kernel dump C++ parser library with Python 3 bindings.☆213Oct 5, 2025Updated 5 months ago