DarthTon / wow64dm
☆12Updated this week
Related projects: ⓘ
- ☆19Updated this week
- ☆11Updated this week
- ☆13Updated 7 years ago
- windows kernel File redirection☆18Updated 9 years ago
- ☆25Updated this week
- profiling tool for analysising the games, get all the characteristic by hook d3d☆17Updated 9 years ago
- Notes my learning steps about Windows-NT☆22Updated 7 years ago
- find and kill injectedThreads from memory☆10Updated 8 years ago
- PE rebuilder, based on yoda's realigndll☆11Updated 12 years ago
- ☆13Updated 6 years ago
- wow64 syscall filter☆13Updated 9 years ago
- User-mode kernel callback framework☆10Updated 10 years ago
- meta op for pe file☆11Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆18Updated 8 years ago
- An analytical debugger programmed in C++, using Qt.☆21Updated 12 years ago
- Lists work items being queued currently.☆12Updated 9 years ago
- simple plugin for lastest olly versions to display the callstack☆15Updated 11 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆21Updated 7 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 5 years ago
- ☆13Updated 8 years ago
- ☆16Updated this week
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆16Updated 8 years ago
- A c++, QT gui based memory engine☆13Updated 6 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 8 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 10 years ago
- MIR-Engine☆21Updated 7 years ago
- Hidden module/dll detector for windows apps☆16Updated 7 years ago
- ☆23Updated 6 years ago
- ☆14Updated 9 years ago
- ☆11Updated this week