everdox / pintools
Contains various pintools to supplement the Intel DBI framework
☆12Updated 9 years ago
Alternatives and similar repositories for pintools:
Users that are interested in pintools are comparing it to the libraries listed below
- ☆13Updated 6 years ago
- Windows device tree walker☆15Updated 6 years ago
- PE rebuilder, based on yoda's realigndll☆12Updated 13 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 7 years ago
- Notes my learning steps about Windows-NT☆23Updated 7 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 10 years ago
- hooking KiUserApcDispatcher☆24Updated 8 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- ☆13Updated 9 years ago
- ☆14Updated 12 years ago
- ShellcodeVM☆14Updated 8 years ago
- ☆8Updated 7 years ago
- ☆14Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- Some crazy PE executables protection kernel driver☆18Updated 4 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Updated 11 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆9Updated 5 years ago
- Lists work items being queued currently.☆13Updated 9 years ago
- WoW64 -> x64☆19Updated 8 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 11 years ago
- Native file compressor using only the ntdll.dll☆9Updated 6 years ago
- ☆16Updated 9 years ago
- A project dedicated towards researching the Windows operating system's kernel mode enviornment.☆8Updated 9 years ago
- User-mode kernel callback framework☆10Updated 11 years ago
- PE Infector/Cryptor source code☆15Updated 7 years ago
- ☆10Updated 7 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- A tiny library that lets you draw on Windows desktop.☆9Updated 8 years ago
- use crystalCPUID to identify vt-x & amd-v☆16Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago