windwos内核研究与驱动Code
☆67Dec 25, 2021Updated 4 years ago
Alternatives and similar repositories for WindowsKernel
Users that are interested in WindowsKernel are comparing it to the libraries listed below
Sorting:
- ☆17Apr 21, 2022Updated 3 years ago
- 学习windows驱动相关☆23Jul 31, 2019Updated 6 years ago
- 汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试,不断更新中☆284Feb 8, 2022Updated 4 years ago
- Load Dll into Kernel space☆40Aug 23, 2022Updated 3 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆62Jan 29, 2026Updated last month
- 基于Intel-VT技术的windows内核增强型驱动☆30Jun 9, 2022Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Apr 26, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- 扫描以及恢复 r3hook 类☆10Aug 29, 2021Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- 有需求做攻防对抗,买本书学习下常见技术,例子敲一敲☆227Jan 25, 2021Updated 5 years ago
- 《Windows内核编程》学习☆62Feb 23, 2021Updated 5 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Win7内核私有符号结构转储☆70Sep 3, 2021Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 8 months ago
- D☆44May 3, 2021Updated 4 years ago
- windows驱动开发、linux编程等☆60Aug 26, 2021Updated 4 years ago
- IDA7.6/IDA7.7/IDA8.1 + Python3 下,Go 在各常见 CPU架构(ARM/MIPS/x86/x64)下, ELF 文件的符号恢复脚本。已适配 Go1.2/Go1.16/Go1.18/Go1.20☆33Oct 12, 2024Updated last year
- What makes it page☆17Aug 24, 2022Updated 3 years ago
- 尽量汇聚反调试资源和利用对抗技术☆182May 21, 2024Updated last year
- manual mapping injector☆29Sep 28, 2025Updated 5 months ago
- Small project to generate fake DLLs based on an executable's import table☆24May 6, 2020Updated 5 years ago
- 过去写的一些Windows安全研究相关代码☆135Feb 2, 2019Updated 7 years ago
- Constexpr hash functions for C++☆19May 29, 2020Updated 5 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- ShellCodeLoader via DInvoke☆60Jul 5, 2021Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆42Sep 3, 2020Updated 5 years ago
- Read Memory without ReadProcessMemory for Current Process☆92Feb 13, 2022Updated 4 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71May 11, 2022Updated 3 years ago
- Load and execute COFF files and Cobalt Strike BOFs in-memory☆226Sep 13, 2022Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Aug 11, 2023Updated 2 years ago
- 注入c#控制台到非托管进程☆17May 9, 2022Updated 3 years ago
- UAC_wenpon☆49Nov 25, 2021Updated 4 years ago