An example of a client and server using Windows' ALPC functions to send and receive data.
☆115Jan 21, 2025Updated last year
Alternatives and similar repositories for ALPC-Example
Users that are interested in ALPC-Example are comparing it to the libraries listed below
Sorting:
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- Advance LPC☆72May 2, 2017Updated 8 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- ☆125May 23, 2020Updated 5 years ago
- ☆116Oct 1, 2019Updated 6 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Research on Windows Kernel Executive Callback Objects☆315Feb 22, 2020Updated 6 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- Analyze Windows x64 Kernel Memory Layout☆129Nov 19, 2020Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆240Nov 6, 2019Updated 6 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆100Jun 21, 2020Updated 5 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- VT-based PCI device monitor (SPI)☆158Oct 29, 2020Updated 5 years ago
- ☆163Oct 29, 2020Updated 5 years ago
- Open Anti Cheat☆27Jul 16, 2022Updated 3 years ago
- Exploring Windows Internals.☆64Aug 18, 2020Updated 5 years ago
- Windows Kernel Driver with C++ runtime☆181Sep 26, 2020Updated 5 years ago
- Using C++ STL on Windows kernle development☆91Feb 21, 2019Updated 7 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- ☆110Nov 13, 2023Updated 2 years ago
- ☆12Aug 2, 2017Updated 8 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆65Aug 31, 2023Updated 2 years ago
- C++ Exceptions in Windows Drivers☆221Dec 21, 2020Updated 5 years ago
- A simple DLL that can intercept HID messages and pass them on to the real HID DLL, while logging the data.☆22Oct 3, 2014Updated 11 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago