advancedmonitoring / ProxyDll
Some example of code for proxy dll
☆32Updated 5 years ago
Alternatives and similar repositories for ProxyDll:
Users that are interested in ProxyDll are comparing it to the libraries listed below
- Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆40Updated 5 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 3 years ago
- Load dll with undocumented functions and debug symbols☆46Updated 7 months ago
- x64 Windows implementation of virtual-address to physical-address translation☆40Updated 3 years ago
- x64 syscall caller in C++.☆86Updated 6 years ago
- ☆58Updated 2 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆84Updated 2 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆42Updated 3 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆131Updated 4 months ago
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆82Updated 2 years ago
- devirtualization vmprotect☆62Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆54Updated 6 months ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆76Updated last year
- Windows Kernel Programming (Обзорный перевод книги)☆57Updated 4 years ago
- Header-only C++ library for producing PE files.☆31Updated last year
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year
- ☆34Updated 2 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated 7 months ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆41Updated 6 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 3 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆42Updated 7 years ago
- Dynamically generated obfuscated jumps and/or function calls☆34Updated last year
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 4 years ago
- Скрытие Win API☆24Updated 5 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 8 months ago
- D☆42Updated 3 years ago