Harvester57 / CodeIntegrity-DriverBlocklist
☆19Updated this week
Related projects: ⓘ
- ☆31Updated this week
- ☆28Updated this week
- ☆16Updated 5 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆20Updated last year
- Repository of Microsoft Driver Block Lists based off of OS-builds☆38Updated 5 months ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆23Updated 2 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 3 years ago
- ☆25Updated 9 months ago
- The Console Monitor Driver is a KMDF kernel-mode filter driver that captures certain Fast I/O operations (input and output) that is sent …☆34Updated 2 years ago
- Subtract one PE file from another!☆19Updated 2 years ago
- History and analysis of Windows desktop images☆14Updated 3 years ago
- ☆17Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆31Updated 2 years ago
- ☆23Updated 5 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆27Updated 2 years ago
- A ready-made template for a project based on libpeconv.☆40Updated last year
- Code samples that serve as references for Windows API functions☆11Updated 3 months ago
- really ?☆12Updated 6 months ago
- Example/starter code for custom Windows application compatibility shims☆29Updated 3 years ago
- C Header Only Library for Virii☆9Updated 3 years ago
- ☆40Updated this week
- ☆31Updated this week
- Detour hooking IRQ1 ISR through IDT (Interrupt Descriptor Table)☆17Updated last year
- ☆31Updated 4 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆33Updated 2 years ago
- Code Integrity Violation Spotter☆16Updated 3 months ago
- ☆10Updated this week
- An example of COM hijacking using a proxy DLL.☆20Updated 3 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆49Updated 2 years ago
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆10Updated 5 years ago