Events from all manifest-based and mof-based ETW providers across Windows 10 versions
☆329May 2, 2024Updated last year
Alternatives and similar repositories for Windows10EtwEvents
Users that are interested in Windows10EtwEvents are comparing it to the libraries listed below
Sorting:
- Sysmon-Like research tool for ETW☆386Nov 15, 2022Updated 3 years ago
- View ETW Provider manifest☆574Nov 1, 2024Updated last year
- Document ETW providers☆272Mar 28, 2020Updated 5 years ago
- KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.☆753Dec 15, 2025Updated 2 months ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago
- Event Tracing For Windows (ETW) Resources☆417Oct 30, 2025Updated 4 months ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆301Apr 10, 2021Updated 4 years ago
- Process Monitor X v2☆648Jan 22, 2024Updated 2 years ago
- Research on Windows Kernel Executive Callback Objects☆316Feb 22, 2020Updated 6 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆240Nov 6, 2019Updated 6 years ago
- ☆825Jun 1, 2023Updated 2 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆197Dec 6, 2022Updated 3 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- Extract Windows Defender database from vdm files and unpack it☆476Feb 23, 2026Updated last week
- Enumerate and disable common sources of telemetry used by AV/EDR.☆819Mar 11, 2021Updated 4 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- A collection of free miscellaneous Windows tools☆142Jul 22, 2025Updated 7 months ago
- Documentation and supporting script sample for Windows Exploit Guard☆169Sep 8, 2025Updated 5 months ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Jul 8, 2022Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆239Dec 7, 2020Updated 5 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- Analyze Windows x64 Kernel Memory Layout☆129Nov 19, 2020Updated 5 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 3 years ago
- Kernel Pool Monitor☆127Mar 6, 2022Updated 3 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- ☆307May 6, 2021Updated 4 years ago
- VT-based PCI device monitor (SPI)☆158Oct 29, 2020Updated 5 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- C++ Exceptions in Windows Drivers☆221Dec 21, 2020Updated 5 years ago
- Trace events in real time sessions☆47Aug 25, 2023Updated 2 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Jan 21, 2025Updated last year
- ☆116Oct 1, 2019Updated 6 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Dec 10, 2021Updated 4 years ago
- Named pipe I/O ETW provider for Windows☆71Jul 24, 2020Updated 5 years ago