Empyreal96 / W10M_unedited-decomp
Pure Hex-rays Decompiler Psudocode of various Windows 10 Mobile binaries, No edit have been done to the output, you will need to piece together each function, class etc.Provided "as-is"
☆29Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for W10M_unedited-decomp
- A Simple Example☆20Updated 5 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆73Updated last year
- ☆46Updated 3 years ago
- ☆43Updated 3 years ago
- A bunch of architectural headers for i386 and AMD64☆35Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆65Updated 3 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆49Updated 2 years ago
- ☆26Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆63Updated last year
- ☆70Updated 2 years ago
- https://www.codeproject.com/Articles/5348168/Disable-Driver-Signature-Enforcement-with-DSE-Patc☆15Updated last year
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆23Updated 3 years ago
- page table manipulation to gain physical r/w☆38Updated 6 months ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆59Updated 4 years ago
- ☆33Updated 4 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- IDT HOOK KiPageFault test Modified from: github.com/kanren3/x64-IDT-HOOK☆15Updated 4 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆27Updated 2 years ago
- Windows Kernel nt files - To research windows kernel☆15Updated 4 years ago
- The driver STL library used by myself☆12Updated 2 years ago
- Reading/writing memory from kernel-mode☆21Updated 7 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 4 years ago
- ☆14Updated 3 years ago
- A debugger library using VEH.☆41Updated 2 months ago