forderud / RunInSandboxLinks
Launch Windows executables & COM servers in a sandboxed or elevated environment.
☆48Updated 2 months ago
Alternatives and similar repositories for RunInSandbox
Users that are interested in RunInSandbox are comparing it to the libraries listed below
Sorting:
- Run executables in an AppContainer☆124Updated 6 years ago
- A global injection and hooking example☆166Updated 2 years ago
- INF Studio for easier working with driver installation files☆38Updated 2 years ago
- Diff tool for comparing symbols in PDB files☆84Updated 5 years ago
- A tool to extract Windows Manifest files that can be found in the WinSxS folder☆27Updated 5 months ago
- Run any executable as SYSTEM account (no service required)☆138Updated last year
- WNF Utilities 4 Newbies (WNFUN)☆98Updated 7 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 6 years ago
- A local copy of Alex Ionescu's seemingly abandoned native-nt-toolkit project containing knowledge inherited from the ReactOS project.☆54Updated 6 years ago
- This repository contains some tools that I have written in the past☆28Updated 2 years ago
- ☆40Updated 8 years ago
- BITS Transfers Manager☆44Updated 7 months ago
- View handles and object for each object type☆64Updated 6 years ago
- Public issue and feedback tracking for WinDbg Preview.☆57Updated 7 months ago
- ☆69Updated 3 years ago
- Kernel Pool Monitor☆127Updated 3 years ago
- Portable Executable launcher for Windows NT bypassing loader☆71Updated 3 months ago
- ☆58Updated 2 weeks ago
- Example of real-time Windows ETW packet capture session☆54Updated 8 years ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Updated last year
- Expand compressed files from WinSxS folder☆167Updated 5 months ago
- Trace events in real time sessions☆45Updated 2 years ago
- A driver to intercept low level windows events☆63Updated 6 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆52Updated 5 years ago
- Yet another PE Viewer☆142Updated 2 years ago
- Explore Job Objects on a Windows system☆82Updated 6 years ago
- A hooking library with a MinHook-like API and a Detours-like implementation, with support for the x86, x64, and ARM64 platforms☆31Updated last week
- A WinDbg extension to trace COM interactions☆122Updated 4 months ago
- Explore .NET Processes and Dump files☆118Updated 5 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆52Updated 7 years ago