ikermit / 11SyscallsLinks
Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.
☆24Updated 4 years ago
Alternatives and similar repositories for 11Syscalls
Users that are interested in 11Syscalls are comparing it to the libraries listed below
Sorting:
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago
- Code samples that serve as references for Windows API functions☆76Updated last year
- ☆29Updated 2 years ago
- ☆72Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆65Updated 3 years ago
- ☆45Updated 3 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Updated 7 months ago
- ☆83Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆120Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Updated last year
- An example of how to use Microsoft Windows Warbird technology☆91Updated 2 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆115Updated 4 years ago
- ☆118Updated 3 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 4 years ago
- Minifilter Callback Patching Proof-of-Concept☆73Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- Easy encrypt/decrypt data with TPM☆25Updated last year
- Reimplementation of the KExecDD DSE bypass technique.☆58Updated last year
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Updated 2 years ago
- Intel 64/Windows low-level experiments☆63Updated 5 months ago
- ☆53Updated 10 months ago
- ☆60Updated 9 months ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Updated 2 years ago
- Exploiting the KsecDD Windows driver through Server Silos☆76Updated last year
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆52Updated 3 years ago
- ☆90Updated last year