bigbang95 / ntoskrnlLinks
Windows 常用版本内核文件收集
☆12Updated 2 years ago
Alternatives and similar repositories for ntoskrnl
Users that are interested in ntoskrnl are comparing it to the libraries listed below
Sorting:
- 利用物理内存映射,实现虚拟内存的伪隐藏☆84Updated 3 years ago
- 简单安排一下 autochk.sys 这个rootkit☆73Updated 2 years ago
- about how to make a anti-virus engine☆89Updated 3 months ago
- 大数字驱动逆向代码☆74Updated last year
- shellcode生成框架☆87Updated last year
- Hide processes, files, services in Windows ring3☆28Updated last year
- windwos内核研究与驱动Code☆66Updated 3 years ago
- 隐藏可执行内存☆262Updated 4 months ago
- IDA Python script for generating Windows x86 shellcode with one click☆38Updated 2 years ago
- ☆33Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆130Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆72Updated 3 years ago
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆21Updated 8 months ago
- 无痕注入1☆77Updated 4 years ago
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆180Updated 3 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆60Updated 2 years ago
- X86 Packer with Portable Executable compatibility.☆57Updated 3 weeks ago
- Kill Protected Process Light Process (include av)☆58Updated 2 years ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear” 》☆138Updated 10 months ago
- Call NtCreateUserProcess directly as normal.☆74Updated 3 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆57Updated 3 months ago
- It's a kernel-based keylogger for Windows x86/x64.☆142Updated 3 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆37Updated 2 months ago
- Windows API Call Obfuscation☆109Updated 2 years ago
- shellcode 生成框架☆277Updated 3 years ago
- Enum and Remove Hook in Windows☆38Updated last week
- An implementation of an indirect system call☆131Updated 2 years ago
- A method to execute syscalls while bypassing EDR's function hooking and call stack analysis.☆23Updated 4 months ago
- Free(or force?)file and delete it☆12Updated 6 years ago