NewWorldComingSoon / llvm-msvcLinks
This project migrated to https://github.com/backengineering/llvm-msvc
☆83Updated last year
Alternatives and similar repositories for llvm-msvc
Users that are interested in llvm-msvc are comparing it to the libraries listed below
Sorting:
- Windows PDB parser for kernel-mode environment.☆98Updated last month
- Binary rewriter for 64-bit PE files.☆83Updated last year
- ☆74Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆72Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆189Updated 2 years ago
- Kernel ReClassEx☆62Updated last year
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆71Updated 5 years ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆71Updated last year
- InfinityHookProMax: Make InfinityHook great great again☆46Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆88Updated last month
- ☆138Updated 2 years ago
- A debugger library using VEH.☆61Updated 10 months ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Updated 2 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆145Updated last year
- C++ library for parsing and manipulating PE files statically and dynamically.☆88Updated last year
- Collect various versions of ntoskrnl files☆55Updated last year
- A library to assist with memory & code protection.☆61Updated last year
- 🪝 Different aproaches to detecting EPT hooks☆114Updated 3 years ago
- A simple ida python script to find .data ptr☆51Updated 2 years ago
- ☆121Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 7 years ago
- PoC kernel to usermode injection☆87Updated last year
- A x86 CPU & Environment emulator for Windows user and kernel binaries.☆124Updated this week
- nmi stackwalking + module verification☆128Updated last year
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆98Updated last month
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆114Updated 3 years ago
- ☆70Updated 3 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago