JustasMasiulis / process_handle
A cross platform, leak free system handle wrapper
☆19Updated 7 years ago
Alternatives and similar repositories for process_handle:
Users that are interested in process_handle are comparing it to the libraries listed below
- cross platform library to manipulate and extract information of memory regions☆34Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Very tiny and selective implementation of STL for Windows NT kernel mode drivers☆18Updated 3 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 5 years ago
- Remote memory library in C++17.☆31Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 10 years ago
- Small utility to dump certificate information from a Portable Executable file.☆9Updated 6 years ago
- Personal curation of Clang/LLVM patches.☆13Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- use crystalCPUID to identify vt-x & amd-v☆16Updated 10 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- A modern c++ implementation of windows heavens gate☆8Updated 4 years ago
- a method for undetectable breakpoints in 32-bit Windows programs☆13Updated 10 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- Simple program for static hooking dynamic libraries in executable application☆21Updated 11 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Updated 7 years ago
- Some crazy PE executables protection kernel driver☆18Updated 4 years ago
- Some interesting code☆18Updated 10 years ago
- MIR-Engine☆24Updated 7 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 3 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 11 years ago
- Given a global name in IDA Pro, find all xrefs which are contained in an exported function.☆11Updated 8 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- NT reversal☆25Updated 6 years ago
- Windows Server 2K3 NT 5☆12Updated 3 years ago
- Simple header only library to change return address on current stack frame.☆23Updated 8 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆26Updated 6 years ago
- Event Tracing for Windows Custom Events☆21Updated 10 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago