Yet another windows syscall library
☆18Jun 22, 2020Updated 5 years ago
Alternatives and similar repositories for SPiCall
Users that are interested in SPiCall are comparing it to the libraries listed below
Sorting:
- displays processes, modules and memory layout☆17Aug 4, 2020Updated 5 years ago
- Exploring Windows Internals.☆64Aug 18, 2020Updated 5 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- VT Hook☆51Jul 2, 2024Updated last year
- ☆14Oct 5, 2019Updated 6 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Static library and headers for linking your software with ntdll.dll☆37Dec 16, 2019Updated 6 years ago
- Library for using direct system calls☆36Jan 30, 2025Updated last year
- ☆15Jun 13, 2025Updated 8 months ago
- An example code of CiGetCertPublisherName☆17Mar 24, 2022Updated 3 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- interesting analysis☆16May 14, 2018Updated 7 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- ☆68Dec 17, 2020Updated 5 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Command line tool to create an export defintion file from a dynamic link library☆27May 2, 2023Updated 2 years ago
- ☆19Sep 27, 2018Updated 7 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)☆24May 20, 2021Updated 4 years ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆28Feb 3, 2024Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Mar 13, 2020Updated 5 years ago
- hooklib is a library that is used to inject DLL libraries in the processes, the interception code and the implementation of IPC.☆22Nov 18, 2015Updated 10 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- fork HoShiMin Avanguard☆20Sep 29, 2018Updated 7 years ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Jun 1, 2018Updated 7 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- Hijack Printconfig.dll to execute shellcode☆100Jan 15, 2021Updated 5 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- ☆61Feb 10, 2022Updated 4 years ago