HoShiMin / AriadnaProjectLinks
๐งถ The Win32 usermode threading library with UMS/fibers/threads support
โ30Updated 6 years ago
Alternatives and similar repositories for AriadnaProject
Users that are interested in AriadnaProject are comparing it to the libraries listed below
Sorting:
- Analysing and defeating PatchGuard universallyโ36Updated 5 years ago
- Figuring out the cause of a handle downgradeโ24Updated 2 years ago
- Translates WinDbg "dt" structure dump to a C structureโ13Updated 5 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an objectโ50Updated 4 years ago
- Remote memory library in C++17.โ33Updated 7 years ago
- Example of hijacking system calls via function pointer tablesโ31Updated 4 years ago
- win32/x64 obfuscate frameworkโ33Updated 6 years ago
- NT reversalโ26Updated 7 years ago
- x64 assembler libraryโ31Updated last year
- A class to gather information about a process, its threads and modules.โ23Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windowsโ30Updated 5 years ago
- โ44Updated 7 years ago
- Simple header only library to change return address on current stack frame.โ23Updated 9 years ago
- Library for linking multiple PE\PE + files to oneโ52Updated last year
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.โ24Updated 8 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)โ43Updated 7 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.โ27Updated 5 years ago
- cross platform library to manipulate and extract information of memory regionsโ33Updated 7 years ago
- Static library and headers for linking your software with ntdll.dllโ37Updated 5 years ago
- Small project to generate fake DLLs based on an executable's import tableโ24Updated 5 years ago
- Library for using direct system callsโ36Updated 9 months ago
- Code injection by hijacking threads in Windows 32-bit applicationsโ43Updated 7 years ago
- Analyze PatchGuardโ57Updated 7 years ago
- Driver Loader/BE Bypass/Win Malware(lol)โ36Updated 6 years ago
- easy to use vtable hook with RTTI supportโ23Updated 6 years ago
- (shard of furikuri project) assambler for code obfuscationโ19Updated 6 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable โฆโ23Updated 8 years ago
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformationโ16Updated 7 years ago
- Fetch PDB symbols directly from Microsoft's symbol serversโ42Updated 3 weeks ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtimeโ45Updated 8 months ago