apriorit / Screenshot_DesktopLinks
☆9Updated 4 years ago
Alternatives and similar repositories for Screenshot_Desktop
Users that are interested in Screenshot_Desktop are comparing it to the libraries listed below
Sorting:
- Samples from my book Windows Native API programming☆71Updated 2 months ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆52Updated last year
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆64Updated 10 months ago
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆30Updated last year
- ☆13Updated 8 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆88Updated 3 months ago
- Add an empty section to a PE file☆52Updated 7 years ago
- Remote Thread Detection with a Kernel Driver☆31Updated 6 months ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Updated last year
- Reverse Socks5 proxy for windows☆14Updated 2 years ago
- View Windows System in action☆41Updated last month
- research revolving the windows filtering platform callout mechanism☆32Updated last year
- C++ library for low-level Windows development☆75Updated last year
- ☆29Updated 10 months ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- ☆18Updated 2 years ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Updated last year
- c++ implementation of windows heavens gate☆72Updated 4 years ago
- Collection of DLL function export forwards for DLL export function proxying☆98Updated last year
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆87Updated 2 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆139Updated 2 years ago
- kernel to user mode APC injector☆45Updated 3 years ago
- An implementation of the Process Hollowing technique.☆16Updated 4 years ago
- Compile-Time Calls Obfuscator for C++14+☆48Updated last year
- SetWinEventHook Sample☆48Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆70Updated 3 months ago
- Example of building an application verifer DLL☆48Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆38Updated last year
- silence file system monitoring components by hooking their minifilters☆57Updated last year