NewWorldComingSoon / llvm-msvcLinks
This project migrated to https://github.com/backengineering/llvm-msvc
☆82Updated last year
Alternatives and similar repositories for llvm-msvc
Users that are interested in llvm-msvc are comparing it to the libraries listed below
Sorting:
- Windows PDB parser for kernel-mode environment.☆97Updated 2 weeks ago
- Kernel driver for detecting Intel VT-x hypervisors.☆188Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- ☆74Updated 2 years ago
- ☆138Updated 2 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆71Updated 5 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆94Updated 3 weeks ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆70Updated last year
- nmi stackwalking + module verification☆124Updated last year
- This project migrated to https://github.com/backengineering/llvm-msvc☆143Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆86Updated last month
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆71Updated last year
- PAGE_GUARD based hooking library☆46Updated 2 years ago
- ntoskrnl .data hooks for UM-KM communication☆40Updated last year
- InfinityHookProMax: Make InfinityHook great great again☆45Updated last year
- Kernel ReClassEx☆62Updated last year
- POC Hook of nt!HvcallCodeVa☆52Updated 2 years ago
- Binary rewriter for 64-bit PE files.☆78Updated last year
- A simple tool to assemble shellcode ready to be copy-pasted into code☆68Updated 3 years ago
- A simple ida python script to find .data ptr☆51Updated 2 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆118Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- ☆45Updated 2 years ago
- ☆69Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆91Updated 2 years ago
- ☆120Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Updated 2 years ago
- ☆24Updated 7 months ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago