Ready-to-use headers for Windows Kernel SSDT indices
☆11Apr 12, 2020Updated 5 years ago
Alternatives and similar repositories for SSDT-Index
Users that are interested in SSDT-Index are comparing it to the libraries listed below
Sorting:
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- ☆18Oct 12, 2014Updated 11 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆27Feb 20, 2019Updated 7 years ago
- 扫描以及恢复 r3hook 类☆10Aug 29, 2021Updated 4 years ago
- Static Library For Windows Drivers☆41Dec 13, 2025Updated 2 months ago
- Библиотека шифрования XTEA3 на С++☆14Jul 6, 2019Updated 6 years ago
- Collection of Windows kernel driver examples, offering insights into Windows internals, rootkit evasion, and advanced driver development.☆12Nov 23, 2023Updated 2 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Aug 13, 2014Updated 11 years ago
- windows kernel-mode driver, provide memory reading & writing, mini-filters, obCallbacks☆10Mar 20, 2019Updated 6 years ago
- 绕过火绒剑检测的一个简单的inlinehook方法☆12Mar 10, 2019Updated 6 years ago
- Win32 API Hook偵測☆10Oct 1, 2017Updated 8 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- ☆10Sep 1, 2021Updated 4 years ago
- Kernel based monitor to check if specified process loads libraries only from allowed directories☆12May 21, 2020Updated 5 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆20Jul 31, 2019Updated 6 years ago
- ☆36Mar 19, 2019Updated 6 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆54Jan 19, 2021Updated 5 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆15Sep 21, 2019Updated 6 years ago
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆17Apr 30, 2020Updated 5 years ago
- ☆117Feb 11, 2022Updated 4 years ago
- ☆34Aug 14, 2023Updated 2 years ago
- Windows CVE主防(HIPS/HIDS)☆57Apr 29, 2021Updated 4 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- ☆15Dec 26, 2017Updated 8 years ago
- read process memory with process_vm_readv☆16Feb 10, 2020Updated 6 years ago
- An example code of CiGetCertPublisherName☆17Mar 24, 2022Updated 3 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- ☆13May 31, 2023Updated 2 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Windows注入内核感染导入表注入X64☆13Oct 20, 2018Updated 7 years ago
- PE Infector/Cryptor source code☆16Apr 30, 2017Updated 8 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago