ionescu007 / r0akLinks
☆34Updated 7 years ago
Alternatives and similar repositories for r0ak
Users that are interested in r0ak are comparing it to the libraries listed below
Sorting:
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆89Updated 10 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 4 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Updated 6 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆78Updated 6 years ago
- Documenting system information classes and their uses☆56Updated 4 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆52Updated 4 years ago
- Simple windows API logger☆109Updated 6 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- Miscellaneous Code and Docs☆84Updated 4 months ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Updated 6 years ago
- ☆68Updated 4 years ago
- Enumerate user mode shared memory mappings on Windows.☆125Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Updated 5 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆144Updated 5 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 6 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆147Updated 6 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆236Updated 6 years ago
- API Set resolver for Windows☆140Updated last year
- APC Internals Research Code☆168Updated 5 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Updated 7 years ago
- An automatic tool for fixing dumped PE files☆42Updated 5 years ago
- ☆131Updated last year
- An example of a client and server using Windows' ALPC functions to send and receive data.☆107Updated 9 months ago
- A driver to intercept low level windows events☆62Updated 6 years ago
- ☆108Updated 7 years ago
- ASUSTeK AsIO3 I/O driver unlock☆23Updated 4 years ago
- PDB file inspection tool☆83Updated this week
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆118Updated 5 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago