Yet another windows syscall library
☆18Jun 22, 2020Updated 5 years ago
Alternatives and similar repositories for SPiCall
Users that are interested in SPiCall are comparing it to the libraries listed below
Sorting:
- displays processes, modules and memory layout☆17Aug 4, 2020Updated 5 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- Exploring Windows Internals.☆64Aug 18, 2020Updated 5 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- Static library and headers for linking your software with ntdll.dll☆37Dec 16, 2019Updated 6 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Jun 1, 2018Updated 7 years ago
- VT Hook☆51Jul 2, 2024Updated last year
- ☆15Dec 16, 2020Updated 5 years ago
- hooklib is a library that is used to inject DLL libraries in the processes, the interception code and the implementation of IPC.☆22Nov 18, 2015Updated 10 years ago
- ☆69Dec 17, 2020Updated 5 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 3 years ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Mar 13, 2020Updated 6 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- 快速内存搜索算法,商用级别☆137Nov 2, 2018Updated 7 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- ☆61Feb 10, 2022Updated 4 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- Hijack Printconfig.dll to execute shellcode☆101Jan 15, 2021Updated 5 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- ☆15Jun 13, 2025Updated 9 months ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 8 months ago
- This is a simple tool to remove the "Rich" header from binaries (EXE or DLL files) created by M$ development tools.☆33Feb 3, 2021Updated 5 years ago
- OBS plugin to capture directly from DWM shared surface textures☆69May 26, 2016Updated 9 years ago
- ☆163Oct 29, 2020Updated 5 years ago
- Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)☆25May 20, 2021Updated 4 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- fork HoShiMin Avanguard☆20Sep 29, 2018Updated 7 years ago
- Simple header only library to change return address on current stack frame.☆22Sep 4, 2016Updated 9 years ago
- Command line tool to create an export defintion file from a dynamic link library☆27May 2, 2023Updated 2 years ago