biocomp / hw_breakLinks
Programmatically set hardware breakpoint with C++ on Windows
☆37Updated last year
Alternatives and similar repositories for hw_break
Users that are interested in hw_break are comparing it to the libraries listed below
Sorting:
- .lib file for linking against the NT CRT☆19Updated 3 years ago
- ☆21Updated last year
- X86/X64 Hardware Breakpoint Manager☆41Updated 4 years ago
- Load Dll into Kernel space☆38Updated 2 years ago
- Set hardware breakpoints programmaticaly - for windows x86/64☆29Updated 6 years ago
- Lightweight x86-64 disassembling library☆43Updated 2 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- Windows user mini-dump helper library to extract data from it.☆11Updated 2 months ago
- Generate a PDB file given the old PDB file and an address mapping☆48Updated 4 months ago
- Alternative Windows C runtime for minimal binary size☆38Updated 9 years ago
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆30Updated last year
- Debug Print viewer (user and kernel)☆66Updated last year
- ☆29Updated 3 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Updated 4 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Updated 5 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆64Updated 10 months ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- ☆33Updated 3 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆15Updated last year
- Dell Driver EoP (CVE-2021-21551)☆26Updated 2 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆31Updated 3 years ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆29Updated 7 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆10Updated 2 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆17Updated 3 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Updated 2 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Updated last week
- Walks through the 4-level paging structures in Windows x64☆13Updated 2 years ago
- Application Verifier Dynamic Fault Injection☆39Updated 3 months ago