emlinhax / DbgViewEx
combine the power of procmon and dbgview into one single application
☆6Updated last year
Alternatives and similar repositories for DbgViewEx:
Users that are interested in DbgViewEx are comparing it to the libraries listed below
- Injector with kernel power☆16Updated 4 years ago
- POC kernel driver with hidden system thread☆13Updated 9 months ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Logging library for kernel drivers written for the Windows NT operating system.☆19Updated 8 months ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- x64 assembler library☆31Updated 8 months ago
- ☆21Updated last year
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Updated 2 years ago
- Protected Process Light Library☆18Updated 4 years ago
- Elevate arbitrary MSR writes to kernel execution.☆26Updated last year
- ☆30Updated last year
- manual mapping injector☆28Updated 2 years ago
- ☆16Updated 2 years ago
- Written in a couple hours, don't judge :)☆14Updated last year
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- Driver that communicates using a thread and a shared section with Usermode☆38Updated last week
- What makes it page☆17Updated 2 years ago
- Experiment to use sections as User/Kernelmode comm vector☆20Updated last year
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- partially disable patchguard up to win11 21H2☆18Updated 8 months ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆17Updated 8 months ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- Bypassing kernel patch protection runtime☆19Updated 2 years ago
- Header only UM AC "bypass"☆18Updated 9 months ago
- ☆22Updated 11 months ago