Simple driver to register all available process, thread, image, Registry, and Object callbacks
☆124Oct 5, 2017Updated 8 years ago
Alternatives and similar repositories for kmexts
Users that are interested in kmexts are comparing it to the libraries listed below
Sorting:
- penter hook example and driver time recorder☆31Oct 2, 2017Updated 8 years ago
- Writing WDF Drivers I: Core Concepts Lab Material☆53Updated this week
- Hypervisor based tool for monitoring system register accesses.☆154Sep 13, 2018Updated 7 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- Windows Kernel Template Library☆114Sep 13, 2022Updated 3 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- a network filter using NDIS hook technique☆19Mar 28, 2013Updated 12 years ago
- just an lite AntiRootkit for interesting☆24Dec 9, 2015Updated 10 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Jul 11, 2018Updated 7 years ago
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- Various WinDbg extensions and scripts☆33Sep 13, 2018Updated 7 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- A drop-in replacement for the C++ STL for kernel mode Windows drivers. The goal is to have implementations for things like the standard a…☆33Jul 12, 2016Updated 9 years ago
- Elevation of privilege detector based on HyperPlatform☆123Mar 5, 2017Updated 8 years ago
- C++ Exceptions in Windows Drivers☆221Dec 21, 2020Updated 5 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- Windows kernel-mode callbacks tutorial driver☆48Aug 8, 2016Updated 9 years ago
- Windows driver including couple different techniques for file removal when regular operation isn't possible.☆70Feb 11, 2016Updated 10 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- Debugger extension for the Debugging Tools for Windows (WinDbg, KD, CDB, NTSD).☆69Nov 14, 2016Updated 9 years ago
- Using C++ STL on Windows kernle development☆91Feb 21, 2019Updated 7 years ago
- Kernel Pool Monitor☆127Mar 6, 2022Updated 3 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- Research on Windows Kernel Executive Callback Objects☆315Feb 22, 2020Updated 6 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- ☆27Apr 4, 2019Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago