eladraz / xStlLinks
xStl is a cross-compile, cross-platform C++ library that implements a set of generic templates for easy development.
☆17Updated 8 years ago
Alternatives and similar repositories for xStl
Users that are interested in xStl are comparing it to the libraries listed below
Sorting:
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- User-mode kernel callback framework☆10Updated 11 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆10Updated 6 years ago
- A system call tracer☆10Updated 10 years ago
- Handy WMI query tool.☆12Updated 9 years ago
- Minifilter Driver☆15Updated 8 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Updated 10 years ago
- ☆14Updated 8 years ago
- An analytical debugger programmed in C++, using Qt.☆21Updated 13 years ago
- Sample debugger for x86 and x64☆4Updated 3 years ago
- ☆13Updated 9 years ago
- Enumerates very, very large directories quickly by directly using kernel syscalls. For POSIX and Windows. WARNING THIS IS OBSOLETE. USE B…☆15Updated 10 years ago
- ☆14Updated 6 years ago
- hypervisor in windows device driver by intel vt☆13Updated 6 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆23Updated 12 years ago
- ☆17Updated 8 years ago
- ☆10Updated 11 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Updated 7 years ago
- windows kernel File redirection☆20Updated 10 years ago
- windows ntfs legasy file system filter☆1Updated 9 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- A simple Windows x86-32 debugger☆10Updated 9 years ago
- Lists work items being queued currently.☆14Updated 10 years ago
- Hook APIs and send data back to another process with Google Protobufs☆2Updated 3 years ago
- ☆14Updated 10 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- Event Tracing for Windows Custom Events☆21Updated 10 years ago
- ☆13Updated 8 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 6 years ago
- ☆12Updated 8 years ago