georgenicolaou / W64oWoW64Links
Library that allows you to run 64bit code on a Wow64 32bit process
☆147Updated 8 years ago
Alternatives and similar repositories for W64oWoW64
Users that are interested in W64oWoW64 are comparing it to the libraries listed below
Sorting:
- Windbg extension to find PatchGuard pages☆122Updated 11 years ago
- Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303☆110Updated 7 years ago
- Elevation of privilege detector based on HyperPlatform☆122Updated 8 years ago
- Library for kernel and user mode splicing for Windows (x86 and x64).☆64Updated 12 years ago
- windows kernelmode and usermode IAT hook☆148Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structure☆131Updated 8 years ago
- A command tree based on commands and extensions for Windows Kernel Debugging.☆109Updated 5 years ago
- x64dbg conditional branches logger [Plugin]☆72Updated 8 years ago
- ☆117Updated 12 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆80Updated 14 years ago
- 0CCh Windbg extension: include some useful commands☆113Updated 2 years ago
- ☆57Updated 11 years ago
- PatchGuard Research☆303Updated 6 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆63Updated 6 years ago
- Hypervisor based tool for monitoring system register accesses.☆147Updated 7 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆145Updated 6 years ago
- ☆131Updated 11 months ago
- Kernel Detective☆148Updated 3 years ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆84Updated last year
- Advance LPC☆70Updated 8 years ago
- Collection Of Anti-Debugging Tricks☆101Updated 9 years ago
- ☆108Updated 6 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆179Updated 7 years ago
- Anti-Anti-VM solution via Windows Driver☆59Updated 7 years ago
- Win64/Rovnix - Volume Boot Record Bootkit☆176Updated 10 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆95Updated 8 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆88Updated 9 years ago
- Load a Windows Kernel Driver☆93Updated 8 years ago
- hook msr by amd svm☆123Updated 5 years ago