HoShiMin / AriadnaProjectLinks
๐งถ The Win32 usermode threading library with UMS/fibers/threads support
โ30Updated 6 years ago
Alternatives and similar repositories for AriadnaProject
Users that are interested in AriadnaProject are comparing it to the libraries listed below
Sorting:
- Analysing and defeating PatchGuard universallyโ35Updated 4 years ago
- Figuring out the cause of a handle downgradeโ24Updated 2 years ago
- win32/x64 obfuscate frameworkโ33Updated 6 years ago
- x64 assembler libraryโ31Updated last year
- Example of hijacking system calls via function pointer tablesโ31Updated 4 years ago
- Remote memory library in C++17.โ33Updated 7 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64โ20Updated 7 years ago
- Translates WinDbg "dt" structure dump to a C structureโ13Updated 5 years ago
- โ45Updated 7 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an objectโ50Updated 4 years ago
- Library for using direct system callsโ36Updated 8 months ago
- NT reversalโ26Updated 7 years ago
- Library for linking multiple PE\PE + files to oneโ52Updated last year
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.โ27Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windowsโ30Updated 5 years ago
- A class to gather information about a process, its threads and modules.โ23Updated 5 years ago
- easy to use vtable hook with RTTI supportโ23Updated 5 years ago
- Static library and headers for linking your software with ntdll.dllโ36Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)โ36Updated 6 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)โ43Updated 7 years ago
- cross platform library to manipulate and extract information of memory regionsโ33Updated 7 years ago
- Small project to generate fake DLLs based on an executable's import tableโ24Updated 5 years ago
- Small memory leak PoC that is happening in IopGetDeviceInterfacesโ25Updated 5 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.โ24Updated 8 years ago
- Code injection by hijacking threads in Windows 32-bit applicationsโ43Updated 7 years ago
- โ24Updated 6 years ago
- Crash Windows 10 up to RS2 from an unprivileged processโ42Updated 7 years ago
- Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)โ20Updated 4 years ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtimeโ45Updated 7 months ago
- Debug Print viewer (user and kernel)โ67Updated last year