hakril / PythonForWindows
A codebase aimed to make interaction with Windows and native execution easier
☆618Updated this week
Alternatives and similar repositories for PythonForWindows:
Users that are interested in PythonForWindows are comparing it to the libraries listed below
- WinAppDbg Debugger☆451Updated last year
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆952Updated last year
- Examples of leaking Kernel Mode information from User Mode on Windows☆586Updated 7 years ago
- Automating x64dbg using Python, Snapshots:☆1,473Updated last year
- Windows Kernel Drivers fuzzer☆306Updated 7 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆731Updated 7 years ago
- windows syscall table from xp ~ 10 rs4☆351Updated 6 years ago
- Portable Executable parsing library (from PE-bear)☆652Updated 5 months ago
- WinDBG Anti-RootKit Extension☆625Updated 4 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆504Updated 5 years ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆539Updated 2 weeks ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆388Updated 5 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆362Updated 7 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,154Updated this week
- Runtime Process Manipulation☆231Updated 2 months ago
- Debug Child Process Tool (auto attach)☆280Updated last year
- Python library to parse and read Microsoft minidump file format☆273Updated last month
- ☆803Updated 5 years ago
- Position Independent Windows Shellcode Written in C☆287Updated 6 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆803Updated 2 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆358Updated 5 years ago
- A small, null-free Windows shellcode that executes calc.exe (x86/x64, all OS/SPs)☆403Updated 8 months ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,198Updated 9 months ago
- Quickly debug shellcode extracted during malware analysis☆580Updated last year
- Obfuscate specific windows apis with different apis☆988Updated 3 years ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager☆661Updated 5 years ago
- ETW Python Library☆275Updated last year
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆314Updated 10 months ago
- idenLib - Library Function Identification [This project is not maintained anymore]☆390Updated 5 years ago
- Incident Response & Digital Forensics Debugging Extension☆375Updated 6 years ago