A-Normal-User / NtSocket_NtClient_NtServerLinks
Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)
☆127Updated 3 years ago
Alternatives and similar repositories for NtSocket_NtClient_NtServer
Users that are interested in NtSocket_NtClient_NtServer are comparing it to the libraries listed below
Sorting:
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- sc4cpp is a shellcode framework based on C++☆95Updated 4 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆86Updated 3 years ago
- Another wow64ext to try to be compatible with WOW64 for all architectures.☆98Updated last month
- Based on minhook☆34Updated 2 years ago
- Call NtCreateUserProcess directly as normal.☆76Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆98Updated 2 years ago
- ☆74Updated 7 years ago
- ☆27Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 3 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Updated 7 years ago
- ☆56Updated 3 years ago
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- It's a kernel-based keylogger for Windows x86/x64.☆142Updated 3 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆55Updated 2 years ago
- ☆53Updated 3 years ago
- Enum and Remove Hook in Windows☆48Updated last month
- SymbolTypeViewer_汉化☆17Updated 5 years ago
- an encryption library designed for Windows kernel and driver programming☆124Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆77Updated last year
- direct systemcalls with a modern c++20 interface.☆45Updated 3 years ago
- a monitoring windows driver calls kernel api tools☆126Updated last year
- 收集常用windows版本内核文件☆35Updated 2 years ago
- 不使用3环挂钩进行DWM桌面绘制☆82Updated 4 years ago
- Compile-Time Calls Obfuscator for C++14+☆50Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 3 years ago
- 滥用cow机制进行全局注入☆99Updated 5 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 3 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Updated last year