BlackOfWorld / Windows-NativeLinks
A wrapper around Windows, calls explicitly the lowest possible calls
☆14Updated 2 years ago
Alternatives and similar repositories for Windows-Native
Users that are interested in Windows-Native are comparing it to the libraries listed below
Sorting:
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- ☆11Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- really ?☆12Updated last year
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- ☆18Updated 6 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- ☆22Updated 2 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆10Updated 3 years ago
- SetWinEventHook Sample☆48Updated last year
- ☆26Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆30Updated 4 years ago
- ☆25Updated 2 years ago
- Subtract one PE file from another!☆20Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆12Updated 3 years ago
- Code samples that serve as references for Windows API functions☆33Updated last year
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- An attempt at reversing WindowsDefender☆20Updated 10 months ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆17Updated last year
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- A simple Linux in-memory .so loader☆30Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆32Updated last year
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- Dangling COM Keys Finder☆17Updated 3 years ago