System call interceptor for windows
☆41Jan 1, 2023Updated 3 years ago
Alternatives and similar repositories for sysintercept
Users that are interested in sysintercept are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Mar 11, 2015Updated 11 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated last year
- ☆14Jan 10, 2017Updated 9 years ago
- After Process monitor, execute Themida☆16Aug 23, 2017Updated 8 years ago
- ☆14Jun 24, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- Handy WMI query tool.☆12Jun 20, 2016Updated 9 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- Code Injection technique written in cpp language☆34Jan 5, 2018Updated 8 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Apr 13, 2017Updated 8 years ago
- PE Bliss - Cross-Platform Portable Executable C++ Library☆16Jan 23, 2018Updated 8 years ago
- reversed emet tool☆24Oct 14, 2012Updated 13 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- A coöperative multitasking framework based on `liburing` and `libucontext`☆16Jan 2, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- Lustre Repository with MS patches☆15Updated this week
- ☆14May 9, 2017Updated 8 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- ☆11Jun 15, 2017Updated 8 years ago
- ☆22May 25, 2017Updated 8 years ago
- reverse engineering extension plugin for windbg☆121Sep 30, 2019Updated 6 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- XDK is a fully featured C++ wrapper library for Windows kernel development☆21Jan 20, 2016Updated 10 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Jan 15, 2014Updated 12 years ago
- Jepsen tests for local filesystems, running on a single node.☆16Aug 15, 2022Updated 3 years ago
- Kernel-Mode driver and User-Mode application communication project☆12Jun 24, 2018Updated 7 years ago
- ☆30May 23, 2017Updated 8 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- Import library generator for x86 PE files☆59Apr 8, 2019Updated 7 years ago
- ☆11Feb 17, 2026Updated last month
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Lustre diagnostic tools for running Lustre in Azure☆10Apr 17, 2024Updated last year
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Win32 API and COM hooking/tracing.☆30Jul 21, 2016Updated 9 years ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆84Aug 24, 2024Updated last year
- A C++ library and tools providing easy access to the retdec.com decompilation service through their REST API.☆11Jun 17, 2018Updated 7 years ago
- library, which help to describe or load and execute PE files.☆55Jun 23, 2013Updated 12 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago