GoodstudyChina / APC-injection-x86-x64Links
☆73Updated 7 years ago
Alternatives and similar repositories for APC-injection-x86-x64
Users that are interested in APC-injection-x86-x64 are comparing it to the libraries listed below
Sorting:
- An example of a client and server using Windows' ALPC functions to send and receive data.☆109Updated 10 months ago
- ☆125Updated 5 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆146Updated 4 years ago
- Collect different versions of Crucial modules.☆143Updated last year
- Analyze Windows x64 Kernel Memory Layout☆125Updated 5 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆96Updated 2 years ago
- Process path modification x64☆59Updated 7 years ago
- 滥用cow机制进行全局注入☆98Updated 4 years ago
- Hook system calls, context switches, page faults and more.☆33Updated 6 years ago
- D☆43Updated 4 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆151Updated 6 years ago
- 收集常用windows版本内核文件☆34Updated 2 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Updated 4 years ago
- a monitoring windows driver calls kernel api tools☆120Updated last year
- ☆116Updated 6 years ago
- ☆144Updated 2 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆180Updated 8 years ago
- Force a file delete using a windows kernel driver☆71Updated 3 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆139Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 3 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆143Updated 2 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 4 years ago
- ☆69Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆90Updated 6 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆72Updated 6 years ago
- Use ci.dll API for validating Authenticode signature of files☆164Updated 3 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆114Updated 3 years ago