WildByDesign / win32-appcontainer-toolsLinks
AppContainer tools for launching sandboxed win32 apps, changing ACL permissions and learning from ETW traces.
☆29Updated 7 months ago
Alternatives and similar repositories for win32-appcontainer-tools
Users that are interested in win32-appcontainer-tools are comparing it to the libraries listed below
Sorting:
- Code samples that serve as references for Windows API functions☆76Updated last year
- Windows kernel PDB data parsed into YAML☆42Updated last month
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆17Updated last year
- ☆25Updated 5 months ago
- ☆14Updated 2 years ago
- ☆29Updated 3 years ago
- Auditing Hooks for https://github.com/jborean93/PSDetour☆13Updated 7 months ago
- Rust PowerShell Hosting Library☆16Updated last month
- Windows Detour Hooking in PowerShell☆80Updated last year
- ☆27Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆42Updated last year
- Example of building an application verifer DLL☆50Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated 6 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆68Updated 3 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- Short Python script for parsing Defender VDM signature files.☆10Updated last year
- anti-ransomware file-system filter☆68Updated last year
- API Set Viewer☆90Updated 11 months ago
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆51Updated 2 years ago
- Simple example for getting started with eBPF for Windows☆48Updated 10 months ago
- Sample for Creating a new kernel object type and supporting API☆26Updated last year
- WinDbg installer/updater☆42Updated 2 years ago
- PDB file inspection tool☆116Updated last month
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 3 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆36Updated 3 years ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- Example/starter code for custom Windows application compatibility shims☆35Updated 4 years ago
- rpv-web is a browser based frontend for the rpv library☆25Updated last month
- Download pdbs from symbol servers and cache locally, parse symbol paths from env vars☆20Updated 9 months ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago