working fork() on windows vista and newer
☆47Oct 21, 2012Updated 13 years ago
Alternatives and similar repositories for win32-fork
Users that are interested in win32-fork are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Windows aero overlay with Direct2D & DirectWrite support☆11May 1, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/windbgshark☆12Nov 3, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- A tool to investigate the Windows device manager☆13Feb 12, 2019Updated 7 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- Spoof Windows Test Signing Mode☆29Oct 13, 2018Updated 7 years ago
- hypervisor in windows device driver by intel vt☆14Aug 25, 2018Updated 7 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- midfunction d3d basehook for winxp, win7, win8, win10☆17Jan 21, 2019Updated 7 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- ☆14Jun 24, 2017Updated 8 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- ☆22May 25, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- Windows Vpn Scripter☆14Dec 7, 2016Updated 9 years ago
- Simple header only library to change return address on current stack frame.☆22Sep 4, 2016Updated 9 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆36Jul 21, 2014Updated 11 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Nov 30, 2017Updated 8 years ago
- Hiding x32/x64 Modules/DLLs using PEB☆62Jun 11, 2015Updated 10 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆21Sep 6, 2018Updated 7 years ago
- Test code only. Not suitable for actual use.☆96Apr 19, 2015Updated 10 years ago
- ☆12Oct 20, 2016Updated 9 years ago
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- An attempt to reverse-engineer the protocol for Diablo III, allowing a MITM attack on the game by intercepting packets as they pass throu…☆13Jun 21, 2012Updated 13 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago