VergiliusProject / vergilius-projectLinks
This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially documented and cannot be found in Windows Driver Kit (WDK) headers. The target audience of this site is driver developers and kernel researches.
☆215Updated 7 months ago
Alternatives and similar repositories for vergilius-project
Users that are interested in vergilius-project are comparing it to the libraries listed below
Sorting:
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆379Updated 2 months ago
- Research on Windows Kernel Executive Callback Objects☆307Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆232Updated 5 years ago
- APC Internals Research Code☆167Updated 5 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆448Updated 4 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆215Updated 3 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆152Updated last year
- This is a collection of interesting codes about Windows Process creation.☆239Updated last year
- Yet another windows internals repo☆207Updated 4 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆330Updated last year
- Advanced driver monitoring utility.☆216Updated 3 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆159Updated 2 years ago
- Debugger Anti-Detection Benchmark☆361Updated last month
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆229Updated 5 years ago
- ☆163Updated 4 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Updated 4 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆158Updated 3 years ago
- Executes 64bit code from a 32bit process☆235Updated 8 years ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆411Updated 3 years ago
- A collection of themes based on pastel colors, created for reverse engineers☆150Updated 5 months ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆206Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆359Updated last year
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆178Updated 3 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆614Updated 7 months ago
- IDA Pro plugin to make bitfield accesses easier to grep☆245Updated last month
- Toy scripts for playing with WinDbg JS API☆238Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆153Updated last year
- ☆147Updated 2 years ago
- A Windows kernel dump C++ parser library with Python 3 bindings.☆208Updated last year
- Analyze patches in a process☆256Updated 4 years ago