ikermit / 11Syscalls
Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.
☆22Updated 3 years ago
Alternatives and similar repositories for 11Syscalls:
Users that are interested in 11Syscalls are comparing it to the libraries listed below
- A few examples of how to trap virtual memory access on Windows.☆29Updated 3 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆15Updated 9 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- ☆71Updated 2 years ago
- Code samples that serve as references for Windows API functions☆30Updated 10 months ago
- Enabled / Disable LSA Protection via BYOVD☆66Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated 10 months ago
- Recon 2023 slides and code☆79Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆98Updated last year
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- Finding Truth in the Shadows☆89Updated 2 years ago
- using the gpu to hide your payload☆56Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- ☆21Updated 3 months ago
- A journal for $6,000 Riot Vanguard bounty.☆63Updated last year
- Example of building an application verifer DLL☆45Updated 10 months ago
- rpv-web is a browser based frontend for the rpv library☆24Updated this week
- ☆29Updated last year
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated 10 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆26Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆106Updated 6 months ago
- ☆82Updated 7 months ago
- An x64dbg plugin which marks XFG call signatures as data☆73Updated last year
- Report and exploit of CVE-2023-36427☆91Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 7 months ago
- ☆37Updated last year