Walking the callstack in windows applications
☆896Aug 4, 2025Updated 7 months ago
Alternatives and similar repositories for StackWalker
Users that are interested in StackWalker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,802Nov 12, 2023Updated 2 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆554Nov 12, 2022Updated 3 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.☆6,177Updated this week
- Simple driver to register all available process, thread, image, Registry, and Object callbacks☆124Oct 5, 2017Updated 8 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆407Jul 12, 2024Updated last year
- Rendering on external windows via hijacking thread contexts☆406Jun 28, 2020Updated 5 years ago
- The functions interception library written on pure C and NativeAPI with UserMode and KernelMode support☆763Apr 24, 2025Updated 10 months ago
- Detours with just single dependency - NTDLL☆674Nov 25, 2025Updated 3 months ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆5,609Nov 3, 2025Updated 4 months ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆180Jun 1, 2025Updated 9 months ago
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,274May 1, 2024Updated last year
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,285Feb 14, 2026Updated last month
- windows LPC library☆44Jun 7, 2013Updated 12 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆346Apr 27, 2020Updated 5 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Crash Windows 10 up to RS2 from an unprivileged process☆42Dec 10, 2017Updated 8 years ago
- C++ graphics kernel subsystem hook☆562Jan 11, 2021Updated 5 years ago
- C++20, x86/x64 Hooking Libary v2.0☆1,828Nov 16, 2025Updated 4 months ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,038Apr 21, 2022Updated 3 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆44Oct 3, 2018Updated 7 years ago
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆895Jun 18, 2025Updated 9 months ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆421Sep 9, 2018Updated 7 years ago
- C++17 PE manualmapper☆442Oct 2, 2021Updated 4 years ago
- MemoryModule which compatible with Win32 API and support exception handling☆450Feb 11, 2025Updated last year
- ☆12Feb 19, 2017Updated 9 years ago
- AntiDebugging sample sources written in C++☆350Jul 23, 2018Updated 7 years ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆446Nov 29, 2021Updated 4 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,362Jan 22, 2022Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- Capcom driver exploit wrapper☆131May 24, 2019Updated 6 years ago
- modify from memorymodule. support exception☆223Oct 22, 2020Updated 5 years ago
- ☆39Oct 29, 2020Updated 5 years ago