kusano / ntfsdump
Extract files from NTFS Volume
☆29Updated 3 years ago
Related projects: ⓘ
- Not Another Code Injection Toolkit☆15Updated 3 years ago
- Trace events in real time sessions☆42Updated last year
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆32Updated 3 years ago
- Blog posts☆30Updated 4 years ago
- MSTSC Packet Dump Utility☆26Updated 2 years ago
- A ready-made template for a project based on libpeconv.☆40Updated last year
- This repository contains some tools that I have written in the past☆25Updated 10 months ago
- Yet another Windows DLL injector.☆36Updated 2 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆59Updated 3 years ago
- Library for Windows XML Event Log (EVTX) data types☆16Updated 2 months ago
- Headers for linking your software with ntdll.dll☆15Updated 3 years ago
- ☆19Updated this week
- ☆38Updated last year
- Yet another windows syscall library☆16Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆30Updated 4 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 5 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆30Updated 7 years ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆19Updated last year
- My commands and scripts extending WinDbg☆28Updated 2 weeks ago
- C Header Only Library for Virii☆9Updated 3 years ago
- ☆13Updated this week
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆33Updated 9 years ago
- Code Integrity Violation Spotter☆16Updated 3 months ago
- Data and structures regarding the research done on WdFilter☆13Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- collection of links related to using and improving windbg☆19Updated 6 years ago
- ☆31Updated this week
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆26Updated 3 years ago
- d☆13Updated 8 months ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago