Simple driver to register all available process, thread, image, Registry, and Object callbacks
☆124Oct 5, 2017Updated 8 years ago
Alternatives and similar repositories for kmexts
Users that are interested in kmexts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Writing WDF Drivers I: Core Concepts Lab Material☆53Feb 24, 2026Updated 3 weeks ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- penter hook example and driver time recorder☆33Oct 2, 2017Updated 8 years ago
- Windows Kernel Template Library☆114Sep 13, 2022Updated 3 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- Hypervisor based tool for monitoring system register accesses.☆155Sep 13, 2018Updated 7 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- Example WDF/KMDF driver and test app demonstrating the "inverted call model"☆37May 1, 2020Updated 5 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Various WinDbg extensions and scripts☆33Sep 13, 2018Updated 7 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Using C++ STL on Windows kernle development☆91Feb 21, 2019Updated 7 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆80Jun 20, 2019Updated 6 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- Detecting execution of kernel memory where is not backed by any image file☆262Jul 11, 2018Updated 7 years ago
- just an lite AntiRootkit for interesting☆24Dec 9, 2015Updated 10 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- a network filter using NDIS hook technique☆19Mar 28, 2013Updated 12 years ago
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Debugger extension for the Debugging Tools for Windows (WinDbg, KD, CDB, NTSD).☆69Nov 14, 2016Updated 9 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Research on Windows Kernel Executive Callback Objects☆316Feb 22, 2020Updated 6 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆37Jul 8, 2024Updated last year
- Elevation of privilege detector based on HyperPlatform☆124Mar 5, 2017Updated 9 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- Monitor activity of any driver☆352Nov 2, 2020Updated 5 years ago
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- PatchGuard Research☆304Oct 6, 2018Updated 7 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,274May 1, 2024Updated last year
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- ☆21Jul 18, 2017Updated 8 years ago