Yet another windows syscall library
☆18Jun 22, 2020Updated 5 years ago
Alternatives and similar repositories for SPiCall
Users that are interested in SPiCall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- displays processes, modules and memory layout☆16Aug 4, 2020Updated 5 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- Exploring Windows Internals.☆63Aug 18, 2020Updated 5 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 7 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Oct 5, 2019Updated 6 years ago
- Static library and headers for linking your software with ntdll.dll☆38Dec 16, 2019Updated 6 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 5 years ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Jun 1, 2018Updated 7 years ago
- VT Hook☆52May 3, 2026Updated 2 weeks ago
- ☆15Dec 16, 2020Updated 5 years ago
- hooklib is a library that is used to inject DLL libraries in the processes, the interception code and the implementation of IPC.☆22Nov 18, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆69Dec 17, 2020Updated 5 years ago
- Headers for linking your software with ntdll.dll☆16Nov 4, 2020Updated 5 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 4 years ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆24Mar 13, 2020Updated 6 years ago
- 一些研究☆14Dec 18, 2019Updated 6 years ago
- 快速内存搜索算法,商用级别☆135Nov 2, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Nov 18, 2020Updated 5 years ago
- ☆61Feb 10, 2022Updated 4 years ago
- Hijack Printconfig.dll to execute shellcode☆102Jan 15, 2021Updated 5 years ago
- ☆14Jun 13, 2025Updated 11 months ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 10 months ago
- This is a simple tool to remove the "Rich" header from binaries (EXE or DLL files) created by M$ development tools.☆33Feb 3, 2021Updated 5 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Oct 28, 2021Updated 4 years ago
- OBS plugin to capture directly from DWM shared surface textures☆71May 26, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆165Oct 29, 2020Updated 5 years ago
- Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)☆26May 20, 2021Updated 5 years ago
- Hide codes/data in the kernel address space.☆187May 8, 2021Updated 5 years ago
- fork HoShiMin Avanguard☆20Sep 29, 2018Updated 7 years ago
- Simple header only library to change return address on current stack frame.☆21Sep 4, 2016Updated 9 years ago
- Command line tool to create an export defintion file from a dynamic link library☆27May 2, 2023Updated 3 years ago
- Intercepting DeviceControl via WPP☆137Nov 18, 2019Updated 6 years ago