GoodstudyChina / APC-injection-x86-x64Links
☆69Updated 7 years ago
Alternatives and similar repositories for APC-injection-x86-x64
Users that are interested in APC-injection-x86-x64 are comparing it to the libraries listed below
Sorting:
- D☆43Updated 4 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆107Updated 9 months ago
- ☆125Updated 5 years ago
- Hook system calls, context switches, page faults and more.☆33Updated 6 years ago
- Collect various versions of ntoskrnl files☆57Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- Collect different versions of Crucial modules.☆143Updated last year
- Analyze Windows x64 Kernel Memory Layout☆124Updated 4 years ago
- Force a file delete using a windows kernel driver☆71Updated 3 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆144Updated 4 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆96Updated 2 years ago
- ☆24Updated 7 years ago
- 滥用cow机制进行全局注入☆98Updated 4 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 4 years ago
- Process path modification x64☆58Updated 7 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago
- 收集常用windows版本内核文件☆34Updated 2 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆112Updated 3 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Updated 7 years ago
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆106Updated 6 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆138Updated 4 years ago
- x64 syscall caller in C++.☆92Updated 7 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 4 years ago
- Use ci.dll API for validating Authenticode signature of files☆159Updated 3 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 3 years ago
- Simple driver to register all available process, thread, image, Registry, and Object callbacks☆124Updated 8 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Updated 4 years ago