BeneficialCode / WinArkLinks
Windows Anti-Rootkit Tool
☆539Updated last month
Alternatives and similar repositories for WinArk
Users that are interested in WinArk are comparing it to the libraries listed below
Sorting:
- InfinityHookPro Win7 -> Win11 latest☆550Updated 2 years ago
- Radical Windows ARK☆251Updated 9 months ago
- ☆562Updated 6 years ago
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆318Updated last year
- MemoryModule which compatible with Win32 API and support exception handling☆444Updated 11 months ago
- VMProtect 3.x Anti-debug Method Improved☆646Updated 6 years ago
- ☆305Updated 2 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆563Updated last year
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆478Updated 4 years ago
- Collection of undocumented Windows API declarations.☆341Updated last week
- System call hook for Windows 10 20H1☆496Updated 4 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆536Updated 6 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆274Updated last year
- A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.☆213Updated 3 months ago
- ☆225Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,270Updated last year
- A x64dbg plugin for quickly locating key functions.☆217Updated last year
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆407Updated last year
- VirtualKD-Redux - A revival and modernization of VirtualKD☆950Updated last year
- a debugger use vt technology☆350Updated 3 years ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,037Updated 3 years ago
- 将shellcode注入dwm.exe以进行屏幕截取☆355Updated 3 years ago
- BaymaxTools is a feature code extraction and search plug-in for x64dbg debugger. it is convenient to extract the signature of the specifi…☆343Updated last year
- Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.☆911Updated last month
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆443Updated 5 years ago
- x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (x64)☆552Updated 4 years ago
- Fix VMProtect3 IAT☆305Updated 2 years ago
- 内核级别隐藏指定窗口☆320Updated 3 years ago
- VMProtect 2.x-3.x x64 Import Deobfuscator☆415Updated 3 months ago
- Simple Intel VT-x hypervisor☆358Updated 2 years ago