cpz / WinWMI
🤡 single header wrapper around Windows WMI for C++
☆13Updated 3 years ago
Alternatives and similar repositories for WinWMI:
Users that are interested in WinWMI are comparing it to the libraries listed below
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- ☆30Updated 2 years ago
- ☆18Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 6 months ago
- A simple way to spoof return addresses using an exception handler☆31Updated 2 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- ☆13Updated 4 years ago
- Not mine, just saved☆11Updated last year
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- IDA scripts for hypervisor (Hyper-v) analysis and reverse engineering automation☆24Updated 3 years ago
- RWX Section Abusing☆17Updated last year
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- Old way for blocking NMI interrupts☆26Updated 2 years ago
- Detour library (x64 and x86 compatible)☆12Updated 4 years ago
- Stealing signatures from pe files☆17Updated last week
- A poc that abuses Enclave☆38Updated 2 years ago
- ☆22Updated last year
- A dumper for all the imports stored within a Windows PE (portable executable).☆15Updated 3 years ago
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- ☆11Updated 10 months ago
- ☆17Updated last year
- Header only UM AC "bypass"☆19Updated 11 months ago
- Open Anti Cheat☆27Updated 2 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- ☆41Updated last year
- x64 assembler library☆31Updated 10 months ago
- Simple driver loader for windows☆17Updated 4 years ago
- ☆10Updated 3 years ago