kkent030315 / NtSymbolView external linksLinks
Resolve DOS MZ executable symbols at runtime
☆96Nov 12, 2021Updated 4 years ago
Alternatives and similar repositories for NtSymbol
Users that are interested in NtSymbol are comparing it to the libraries listed below
Sorting:
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆149Mar 2, 2023Updated 2 years ago
- ☆68Dec 17, 2020Updated 5 years ago
- An example code of CiGetCertPublisherName☆17Mar 24, 2022Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆434Aug 16, 2023Updated 2 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtime☆45Mar 13, 2025Updated 11 months ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆275Jan 27, 2025Updated last year
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆234Apr 2, 2022Updated 3 years ago
- ☆163Sep 18, 2021Updated 4 years ago
- A simple example how to decrypt kernel debugger data block☆31Feb 8, 2021Updated 5 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- BITS Transfers Manager☆45May 18, 2025Updated 8 months ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- Analyze patches in a process☆259Jul 28, 2021Updated 4 years ago
- C++ Exceptions in Windows Drivers☆221Dec 21, 2020Updated 5 years ago
- C++ library for low-level Windows development☆80Apr 12, 2024Updated last year
- ☆55Nov 11, 2021Updated 4 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Jun 19, 2019Updated 6 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆119Feb 8, 2022Updated 4 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆265Aug 31, 2022Updated 3 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- ☆16Mar 1, 2019Updated 6 years ago
- Open Anti Cheat☆27Jul 16, 2022Updated 3 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆333Mar 26, 2024Updated last year
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Sep 1, 2018Updated 7 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago