Cerbersec / HDE64
Hacker Disassembler Engine 64 Copyright (c) 2008-2009, Vyacheslav Patkov. * All rights reserved.
☆44Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for HDE64
- Force a file delete using a windows kernel driver☆61Updated 2 years ago
- ☆121Updated 4 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆89Updated 4 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆143Updated 2 years ago
- ☆125Updated last year
- This project migrated to https://github.com/backengineering/llvm-msvc☆82Updated last year
- Resolve DOS MZ executable symbols at runtime☆93Updated 3 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆67Updated 5 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆124Updated 3 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆123Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆91Updated last year
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆67Updated 3 weeks ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆140Updated last year
- a monitoring windows driver calls kernel api tools☆95Updated 4 months ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆61Updated last year
- ☆52Updated 2 years ago
- Windows PDB parser for kernel-mode environment.☆90Updated last year
- A modern, mod independent open source cheat for Enemy Territory☆65Updated this week
- Standalone program to download PDB Symbol files for debugging without WDK☆73Updated 5 years ago
- query-pdb is a server-side software for parsing PDB files. The software provides PDB online parsing service.☆140Updated 2 months ago
- ☆63Updated 6 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆53Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆110Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆104Updated 2 years ago
- windows kernel pagehook☆38Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆101Updated 2 years ago
- Collect various versions of ntoskrnl files☆48Updated 10 months ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆142Updated 2 months ago
- IDA Plugin that fills in missing indirect CALL & JMP target information☆115Updated last year
- ☆152Updated 5 years ago