Nero22k / Kernel-Programming-2023Links
Repository of different kernel drivers written while studying Windows NT Driver development
☆12Updated last year
Alternatives and similar repositories for Kernel-Programming-2023
Users that are interested in Kernel-Programming-2023 are comparing it to the libraries listed below
Sorting:
- windows rootkit☆61Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆66Updated last year
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆31Updated last year
- Hook all callbacks which are registered with LdrRegisterDllNotification☆88Updated 5 months ago
- silence file system monitoring components by hooking their minifilters☆59Updated last year
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆71Updated 5 months ago
- research revolving the windows filtering platform callout mechanism☆32Updated last year
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- Header-only C++ library for producing PE files.☆34Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆69Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆57Updated 10 months ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆23Updated last year
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated last year
- ☆26Updated 2 years ago
- SetWinEventHook Sample☆48Updated last year
- Example of building an application verifer DLL☆50Updated last year
- Finding Truth in the Shadows☆116Updated 2 years ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated last month
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆23Updated 3 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆43Updated 9 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆79Updated 2 months ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆35Updated 11 months ago
- ☆13Updated 9 months ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- Experiment to use sections as User/Kernelmode comm vector☆22Updated 2 years ago
- Intel 64/Windows low-level experiments☆60Updated last week
- ☆25Updated 4 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year