hfiref0x / WinObjEx64Links
Windows Object Explorer 64-bit
☆1,757Updated this week
Alternatives and similar repositories for WinObjEx64
Users that are interested in WinObjEx64 are comparing it to the libraries listed below
Sorting:
- Windows NT Syscall tables☆1,283Updated 3 weeks ago
- Native API header files for the System Informer project.☆1,185Updated this week
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,222Updated this week
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,226Updated last year
- Hook system calls, context switches, page faults and more.☆2,544Updated 2 years ago
- Windows System Explorer☆853Updated last year
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,731Updated last year
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,121Updated 5 years ago
- Protected Processes Light Killer☆928Updated 2 years ago
- Universal PatchGuard and Driver Signature Enforcement Disable☆843Updated 6 years ago
- Hiding kernel-driver for x86/x64.☆2,302Updated 3 months ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆973Updated last year
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,620Updated last year
- Process Monitor X v2☆613Updated last year
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆971Updated 2 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,253Updated 3 years ago
- All reasonably stable tools☆1,269Updated 2 weeks ago
- VirtualKD-Redux - A revival and modernization of VirtualKD☆894Updated 11 months ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,012Updated 3 years ago
- Disable PatchGuard and Driver Signature Enforcement at boot time☆2,010Updated 3 months ago
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆861Updated 9 months ago
- Kernel Driver Utility☆2,144Updated 6 months ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,197Updated last year
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,905Updated 2 years ago
- Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSi…☆734Updated 5 years ago
- Portable Executable parsing library (from PE-bear)☆655Updated last month
- A Pin Tool for tracing API calls etc☆1,439Updated last month
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆741Updated 7 years ago
- PE Tools - Portable executable (PE) manipulation toolkit☆1,103Updated 7 years ago
- Windows x64 Driver Signature Enforcement Overrider☆753Updated 6 years ago