MartinDrab / IRPMon
The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracker but has several enhancements. It supports 64-bit versions of Windows (no inline hooks are used, only moodifications to driver object structures are performed) and monitors IRP, FastIo, AddDevice, DriverUnload…
☆385Updated 4 months ago
Alternatives and similar repositories for IRPMon
Users that are interested in IRPMon are comparing it to the libraries listed below
Sorting:
- Windows NT x64 syscall fuzzer☆605Updated last year
- WinDBG Anti-RootKit Extension☆629Updated 4 years ago
- PatchGuard Research☆298Updated 6 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆740Updated 7 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆362Updated 5 years ago
- Research on Windows Kernel Executive Callback Objects☆286Updated 5 years ago
- ☆226Updated 3 years ago
- Detours with just single dependency - NTDLL☆636Updated 2 years ago
- windows syscall table from xp ~ 10 rs4☆353Updated 6 years ago
- zer0m0n driver for cuckoo sandbox☆360Updated 9 years ago
- Universal PatchGuard and Driver Signature Enforcement Disable☆844Updated 6 years ago
- ☆397Updated 8 years ago
- Monitor activity of any driver☆334Updated 4 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆434Updated 6 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆599Updated 7 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆387Updated 4 years ago
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆855Updated 8 months ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆870Updated 5 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆367Updated 8 years ago
- Persistent IAT hooking application - based on bearparser☆257Updated 2 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,244Updated 3 years ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆425Updated 3 years ago
- This driver implements the Intel Processor Trace functionality in Intel Skylake architecture for Microsoft Windows☆449Updated 7 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆345Updated 10 years ago
- Minimalistic VT-x hypervisor with hooks☆863Updated 5 years ago
- Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.☆840Updated last year
- Detecting execution of kernel memory where is not backed by any image file☆259Updated 6 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆218Updated 6 years ago
- Source code for File Test - Interactive File System Test Tool☆283Updated last month
- Windows Kernel Drivers fuzzer☆342Updated 8 years ago