hfiref0x / VaultLinks
Various code from the past (for historical purposes)
☆14Updated last year
Alternatives and similar repositories for Vault
Users that are interested in Vault are comparing it to the libraries listed below
Sorting:
- User-mode program parsing logs created by HyperPlatform☆18Updated 8 years ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆20Updated last year
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- Various WinDbg extensions and scripts☆32Updated 6 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Decrement Windows Kernel for fun and profit☆38Updated 7 years ago
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- (This is a fork used primarily to submit patches into upstream repository) RpcView is a free tool to explore and decompile Microsoft RPC …☆19Updated 2 years ago
- Simple error lookup for Win32 and NTSTATUS errors☆19Updated 6 years ago
- This repository contains some tools that I have written in the past☆28Updated last year
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆17Updated 2 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆68Updated 5 years ago
- Debugger extension for the Debugging Tools for Windows (WinDbg, KD, CDB, NTSD).☆69Updated 8 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆36Updated 6 years ago
- ☆46Updated last month
- ☆28Updated 9 years ago
- Screen recorder for x64dbg, for recording screen while debugging.☆11Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆78Updated 14 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 13 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆32Updated 7 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 9 years ago
- NTrace -- a function boundary tracing tool for Windows user and kernel mode☆22Updated 11 years ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Updated 6 months ago
- INF Studio for easier working with driver installation files☆38Updated last year