Fyyre / DrvMonLinks
Advanced driver monitoring utility.
☆217Updated 3 years ago
Alternatives and similar repositories for DrvMon
Users that are interested in DrvMon are comparing it to the libraries listed below
Sorting:
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆257Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆309Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆208Updated 4 years ago
- Single header version of System Informer's phnt library.☆233Updated last week
- Debugger Anti-Detection Benchmark☆377Updated 3 months ago
- x86 PE Mutator☆227Updated 2 years ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆182Updated 3 years ago
- APC Internals Research Code☆168Updated 5 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆155Updated last year
- Simple windows API logger☆109Updated 6 years ago
- ☆149Updated 2 years ago
- Various Process Injection Techniques☆160Updated 3 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆161Updated 3 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆161Updated 3 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated 3 months ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆219Updated 3 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆158Updated last year
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆378Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆237Updated 6 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Updated 4 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆155Updated 2 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆224Updated 3 years ago
- A DTrace on Windows Reimplementation☆366Updated 2 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆106Updated 2 years ago
- MalUnpack companion driver☆97Updated last year
- Resolve DOS MZ executable symbols at runtime☆95Updated 4 years ago
- A Cross-Platform C++ parser library for Windows user minidumps with Python 3 bindings.☆223Updated 2 months ago
- Simple x86/x64 Assembler/Disassembler/Emulator☆187Updated last year
- Load your driver like win32k.sys☆255Updated 3 years ago