cristeigabriela / re-sysinternals-suiteLinks
Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them
☆48Updated last year
Alternatives and similar repositories for re-sysinternals-suite
Users that are interested in re-sysinternals-suite are comparing it to the libraries listed below
Sorting:
- Elevate arbitrary MSR writes to kernel execution.☆37Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆48Updated 4 months ago
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆87Updated 3 months ago
- An x64dbg plugin which marks XFG call signatures as data☆77Updated 2 years ago
- SetWinEventHook Sample☆48Updated last year
- x86 and x64 assembly "read-eval-print loop" for Windows☆29Updated 7 years ago
- A Windows executable (PE) packer (x64) with LZMA compression and with full TLS (Thread Local Storage) support☆67Updated 3 weeks ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- A post-processing script for TinyTracer☆36Updated 2 years ago
- ☆71Updated 2 years ago
- monitors hidden syscalls called from call of duty anticheat☆82Updated 6 months ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Header-only C++ library for producing PE files.☆33Updated 2 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆105Updated last year
- ☆21Updated 5 months ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆21Updated 2 months ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆64Updated 2 years ago
- Load dll with undocumented functions and debug symbols☆47Updated 11 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆41Updated 8 months ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year
- ☆25Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆31Updated last year
- silence file system monitoring components by hooking their minifilters☆57Updated last year
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆39Updated last month
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated 11 months ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆67Updated last month
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago