Important notes and topics on my journey towards mastering Windows Internals
☆436May 2, 2024Updated last year
Alternatives and similar repositories for Windows-Internals
Users that are interested in Windows-Internals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Win32 and Kernel abusing techniques for pentesters☆977Sep 3, 2023Updated 2 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆295Jul 15, 2023Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆250Jul 9, 2024Updated last year
- Hardcore Debugging☆938Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- Tools and PoCs for Windows syscall investigation.☆366Dec 2, 2025Updated 4 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆751May 23, 2025Updated 10 months ago
- PoCs and tools for investigation of Windows process execution techniques☆955Feb 2, 2026Updated 2 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆146Apr 21, 2022Updated 3 years ago
- ☆164Dec 30, 2022Updated 3 years ago
- Now You See Me, Now You Don't☆1,042Jan 23, 2026Updated 2 months ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,616Jul 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The Definitive Guide To Process Cloning on Windows☆543Jan 3, 2024Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- kill anti-malware protected processes ( BYOVD )☆971Jul 21, 2023Updated 2 years ago
- Deleting Shadow Copies In Pure C++☆120Oct 31, 2022Updated 3 years ago
- ☆512Aug 14, 2022Updated 3 years ago
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- PE obfuscator with Evasion in mind☆213Apr 25, 2023Updated 2 years ago
- miscellaneous scripts and programs☆278Jan 23, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PoC Implementation of a fully dynamic call stack spoofer☆943Jul 20, 2024Updated last year
- x64 binary obfuscator☆1,968Jul 14, 2023Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- A PoC implementation for dynamically masking call stacks with timers.☆310Feb 13, 2023Updated 3 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆907Mar 25, 2026Updated 2 weeks ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,297Feb 15, 2026Updated last month
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago
- Sleep Obfuscation☆826Dec 3, 2023Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,430Mar 1, 2026Updated last month
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- A bunch of scripts and code i wrote.☆149Nov 7, 2024Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆594Aug 2, 2025Updated 8 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆673Dec 23, 2022Updated 3 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆129Aug 11, 2023Updated 2 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆791Jan 26, 2026Updated 2 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆764Jan 26, 2025Updated last year