bigbang95 / ntoskrnlLinks
Windows 常用版本内核文件收集
☆12Updated 2 years ago
Alternatives and similar repositories for ntoskrnl
Users that are interested in ntoskrnl are comparing it to the libraries listed below
Sorting:
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 3 years ago
- about how to make a anti-virus engine☆89Updated 4 months ago
- shellcode生成框架☆87Updated last year
- ☆33Updated 2 years ago
- 简单安排一下 autochk.sys 这个rootkit☆72Updated 2 years ago
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆128Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- Hide processes, files, services in Windows ring3☆28Updated last year
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆73Updated 3 years ago
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆20Updated 8 months ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆61Updated 2 years ago
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated 2 years ago
- 大数字驱动逆向代码☆74Updated last year
- Kill Protected Process Light Process (include av)☆58Updated 2 years ago
- windwos内核研究与驱动Code☆66Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆75Updated 3 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆58Updated 3 weeks ago
- X86 Packer with Portable Executable compatibility.☆56Updated last month
- Windows API Call Obfuscation☆108Updated 2 years ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆138Updated 11 months ago
- 隐藏可执行内存☆262Updated 5 months ago
- An implementation of an indirect system call☆131Updated 2 years ago
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆180Updated 3 years ago
- A method to execute syscalls while bypassing EDR's function hooking and call stack analysis.☆23Updated 5 months ago
- 无痕注入1☆75Updated 4 years ago
- Enum and Remove Hook in Windows☆39Updated this week
- shellcode 生成框架☆277Updated 3 years ago
- Free(or force?)file and delete it☆11Updated 6 years ago
- Exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆103Updated last month
- ☆20Updated 3 years ago