windwos内核研究与驱动Code
☆67Dec 25, 2021Updated 4 years ago
Alternatives and similar repositories for WindowsKernel
Users that are interested in WindowsKernel are comparing it to the libraries listed below
Sorting:
- Load Dll into Kernel space☆40Aug 23, 2022Updated 3 years ago
- 汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试,不断更新中☆285Feb 8, 2022Updated 4 years ago
- 基于Intel-VT技术的windows内核增强型驱动☆30Jun 9, 2022Updated 3 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- ☆17Apr 21, 2022Updated 3 years ago
- 学习windows驱动相关☆23Jul 31, 2019Updated 6 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆62Jan 29, 2026Updated last month
- D☆44May 3, 2021Updated 4 years ago
- 扫描以及恢复 r3hook 类☆10Aug 29, 2021Updated 4 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Win7内核私有符号结构转储☆70Sep 3, 2021Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- 有需求做攻防对抗,买本书学习下常见技术,例子敲一敲☆228Jan 25, 2021Updated 5 years ago
- What makes it page☆17Aug 24, 2022Updated 3 years ago
- 注入c#控制台到非托管进程☆17May 9, 2022Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Apr 26, 2021Updated 4 years ago
- 尽量汇聚反调 试资源和利用对抗技术☆182May 21, 2024Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- windows驱动开发、linux编程等☆60Aug 26, 2021Updated 4 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- UAC_wenpon☆49Nov 25, 2021Updated 4 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Aug 11, 2023Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- ☆34Aug 7, 2023Updated 2 years ago
- ShellCodeLoader via DInvoke☆60Jul 5, 2021Updated 4 years ago
- 《Windows内核编程》学习☆62Feb 23, 2021Updated 5 years ago
- 模仿操作系统,加载pe文件到内存中☆80Jun 5, 2019Updated 6 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆80Sep 2, 2024Updated last year
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Aug 11, 2023Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- IDA7.6/IDA7.7/IDA8.1 + Python3 下,Go 在各常见 CPU架构(ARM/MIPS/x86/x64)下, ELF 文件的符号恢复脚本。已适配 Go1.2/Go1.16/Go1.18/Go1.20☆33Oct 12, 2024Updated last year
- manual mapping injector☆29Sep 28, 2025Updated 5 months ago
- https://key08.com/index.php/2021/10/19/1375.html☆71May 11, 2022Updated 3 years ago
- Example of reading process memory through kernel special APC☆110Apr 21, 2023Updated 2 years ago
- 不使用3环挂钩进行DWM桌面绘制☆82Dec 9, 2021Updated 4 years ago