HoShiMin / AriadnaProjectLinks
๐งถ The Win32 usermode threading library with UMS/fibers/threads support
โ30Updated 6 years ago
Alternatives and similar repositories for AriadnaProject
Users that are interested in AriadnaProject are comparing it to the libraries listed below
Sorting:
- win32/x64 obfuscate frameworkโ32Updated 6 years ago
- Remote memory library in C++17.โ31Updated 7 years ago
- Figuring out the cause of a handle downgradeโ24Updated 2 years ago
- NT reversalโ26Updated 7 years ago
- Analysing and defeating PatchGuard universallyโ35Updated 4 years ago
- x64 assembler libraryโ31Updated last year
- Driver demonstrating how to register a DPC to asynchronously wait on an objectโ49Updated 4 years ago
- โ46Updated 6 years ago
- Example of hijacking system calls via function pointer tablesโ31Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structureโ13Updated 5 years ago
- Library for linking multiple PE\PE + files to oneโ52Updated last year
- Static library and headers for linking your software with ntdll.dllโ33Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)โ41Updated 6 years ago
- Library for using direct system callsโ35Updated 6 months ago
- โ24Updated 6 years ago
- Small project to generate fake DLLs based on an executable's import tableโ23Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windowsโ29Updated 5 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64โ20Updated 7 years ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possibleโ17Updated 3 years ago
- easy to use vtable hook with RTTI supportโ23Updated 5 years ago
- โ40Updated 3 months ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtimeโ44Updated 5 months ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetectedโ36Updated 6 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.โ23Updated 8 years ago
- cross platform library to manipulate and extract information of memory regionsโ33Updated 7 years ago
- Analyze PatchGuardโ59Updated 7 years ago
- PE(compressed dll) memory loader using nt apiโ44Updated 8 years ago
- Simple header only library to change return address on current stack frame.โ24Updated 8 years ago
- Shareds for kernel developementโ28Updated 11 years ago
- New handle stealing technique for windows appsโ13Updated 7 years ago