☆53Dec 21, 2022Updated 3 years ago
Alternatives and similar repositories for Anti-Rootkit
Users that are interested in Anti-Rootkit are comparing it to the libraries listed below
Sorting:
- Windows Anti-Rootkit Tool☆547Dec 31, 2025Updated 2 months ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- ☆193May 1, 2023Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- The tool can be used to eliminate redundant instructions in a basic block.☆81Jul 17, 2023Updated 2 years ago
- Библиотека шифрования XTEA3 на С++☆14Jul 6, 2019Updated 6 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- 《面向脚本驱动的软件开发》示例代码☆18Jan 12, 2019Updated 7 years ago
- ☆16Aug 28, 2024Updated last year
- Rootkit & Anti-rootkit☆41Jan 27, 2024Updated 2 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 3 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- Kernel-Mode driver and User-Mode application communication project☆12Jun 24, 2018Updated 7 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆86Sep 15, 2022Updated 3 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆180Jun 1, 2025Updated 9 months ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- Open source anti cheat engine☆43Jul 9, 2024Updated last year
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Aug 28, 2022Updated 3 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- 小型主动防御引擎☆57Jun 24, 2016Updated 9 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆132Apr 23, 2022Updated 3 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- direct systemcalls with a modern c++20 interface.☆45Jan 6, 2023Updated 3 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆35Mar 23, 2024Updated last year
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆20Jul 31, 2019Updated 6 years ago
- ☆23May 8, 2023Updated 2 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago