usermode standalone kernel interface
☆111Jul 9, 2018Updated 7 years ago
Alternatives and similar repositories for Highcall-Library
Users that are interested in Highcall-Library are comparing it to the libraries listed below
Sorting:
- RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, doc…☆72Sep 5, 2020Updated 5 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Windows Kernel Driver with C++ runtime☆181Sep 26, 2020Updated 5 years ago
- Shareds for kernel developement☆29Dec 23, 2013Updated 12 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- A drop-in replacement for the C++ STL for kernel mode Windows drivers. The goal is to have implementations for things like the standard a…☆33Jul 12, 2016Updated 9 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Apr 8, 2015Updated 10 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- Hypervisor based tool for monitoring system register accesses.☆154Sep 13, 2018Updated 7 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Jul 11, 2018Updated 7 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆117May 26, 2020Updated 5 years ago
- Windows Kernel Template Library☆114Sep 13, 2022Updated 3 years ago
- ☆27May 27, 2017Updated 8 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- ☆41Jun 1, 2016Updated 9 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- x86/x64 manual mapping injector using the JUCE library☆89Jun 29, 2020Updated 5 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Oct 23, 2018Updated 7 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- Elevation of privilege detector based on HyperPlatform☆123Mar 5, 2017Updated 8 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- Windows driver including couple different techniques for file removal when regular operation isn't possible.☆70Feb 11, 2016Updated 10 years ago
- midfunction d3d basehook for winxp, win7, win8, win10☆17Jan 21, 2019Updated 7 years ago
- 常用代码类☆13May 31, 2014Updated 11 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago