alal4465 / KernelMonLinks
A ProcMon-esque tool for monitoring Windows Kernel Drivers
☆61Updated 4 years ago
Alternatives and similar repositories for KernelMon
Users that are interested in KernelMon are comparing it to the libraries listed below
Sorting:
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Updated 2 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆92Updated 2 years ago
- fix vmprotect import function used unicorn-engine.☆98Updated 2 years ago
- first commit☆64Updated 5 years ago
- Collect various versions of ntoskrnl files☆59Updated 2 years ago
- ☆127Updated 5 years ago
- Obfuscate calls to imports by patching in stubs☆72Updated 4 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆158Updated last year
- 🪝 Various EPT hook detection approaches☆143Updated 6 months ago
- ☆99Updated 8 years ago
- x64 syscall caller in C++.☆93Updated 7 years ago
- ☆51Updated 5 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Updated 2 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Updated last year
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- Windows PDB parser for kernel-mode environment.☆103Updated 8 months ago
- PE-Dump-Fixer☆111Updated 5 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Updated 3 years ago
- InfinityHookProMax: Make InfinityHook great great again☆52Updated 2 years ago
- Use ci.dll API for validating Authenticode signature of files☆164Updated 3 years ago
- Kernel ReClassEx☆66Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- A plugin to x64dbg that lets you find out what writes to/accesses particular address☆117Updated 5 years ago
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆77Updated 4 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 3 years ago
- VM devirtualization PoC based on AsmJit and llvm☆123Updated 4 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Updated 6 years ago
- A poc that abuses Enclave☆40Updated 3 years ago
- A devirtualization engine for Themida.☆105Updated last year
- a monitoring windows driver calls kernel api tools☆126Updated last year