SouhailHammou / KernelSymbolsHelperView external linksLinks
Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using the symbol server.
☆64Jun 19, 2019Updated 6 years ago
Alternatives and similar repositories for KernelSymbolsHelper
Users that are interested in KernelSymbolsHelper are comparing it to the libraries listed below
Sorting:
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- Microsoft Edge Microsoft Edge主页算法☆20Apr 15, 2019Updated 6 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Jun 21, 2020Updated 5 years ago
- Kernel Pool Monitor☆127Mar 6, 2022Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago
- Recreation of Lode Runner The Legend Returns☆14Feb 13, 2020Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- Research on Windows Kernel Executive Callback Objects☆315Feb 22, 2020Updated 5 years ago
- Reverse engineered source code of the autochk rootkit☆208Nov 1, 2019Updated 6 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Sep 2, 2018Updated 7 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- Open Course for diving security internal☆52Nov 11, 2019Updated 6 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- ☆109Nov 13, 2023Updated 2 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆53Oct 14, 2018Updated 7 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆38Dec 10, 2018Updated 7 years ago
- VT-based PCI device monitor (SPI)☆158Oct 29, 2020Updated 5 years ago
- first commit☆64Oct 29, 2020Updated 5 years ago
- Different ways to get the HDD Serial☆39Apr 7, 2018Updated 7 years ago
- A research project about Windows notify routines.☆38Jul 31, 2020Updated 5 years ago