0xcpu / ExecutiveCallbackObjectsLinks
Research on Windows Kernel Executive Callback Objects
☆306Updated 5 years ago
Alternatives and similar repositories for ExecutiveCallbackObjects
Users that are interested in ExecutiveCallbackObjects are comparing it to the libraries listed below
Sorting:
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆226Updated 5 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆229Updated 5 years ago
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆211Updated 6 months ago
- APC Internals Research Code☆166Updated 5 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆427Updated 4 years ago
- ☆170Updated 10 months ago
- This is a collection of interesting codes about Windows Process creation.☆236Updated last year
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆325Updated last year
- Hyper-V Research is trendy now☆165Updated last week
- Translates WinDbg "dt" structure dump to a C structure☆131Updated 8 years ago
- ☆129Updated 10 months ago
- Toy scripts for playing with WinDbg JS API☆235Updated last year
- Asynchronous Procedure Calls☆236Updated 4 years ago
- PatchGuard Research☆302Updated 6 years ago
- Hyper-V Research is trendy now☆182Updated last year
- A Windows kernel dump C++ parser library with Python 3 bindings.☆204Updated last year
- Windows NT x64 syscall fuzzer☆619Updated last month
- An IDA Plugin that help analyzing module that use COM☆217Updated 2 years ago
- Windows Kernel Programming☆130Updated 5 years ago
- A modern c++ implementation of windows heavens gate☆228Updated 4 years ago
- Yet another windows internals repo☆207Updated 3 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆141Updated 2 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆144Updated 6 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆611Updated 6 months ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆422Updated 4 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆372Updated last month
- Examples of leaking Kernel Mode information from User Mode on Windows☆616Updated 8 years ago
- Lightweight type-1 hypervisor offering a foundation for building advanced security-focused functionality.☆271Updated 6 months ago
- C++ Exceptions in Windows Drivers☆214Updated 4 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆179Updated 7 years ago