m417z / ntdoc
Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers
☆250Updated this week
Alternatives and similar repositories for ntdoc:
Users that are interested in ntdoc are comparing it to the libraries listed below
- Single header version of System Informer's phnt library.☆211Updated this week
- Collection of undocumented Windows API declarations.☆310Updated 3 weeks ago
- Debugger Anti-Detection Benchmark☆328Updated last year
- Anti-debugging techniques on a (bad looking) Win32 application.☆240Updated last year
- An x86-64 Code Virtualizer☆252Updated 6 months ago
- System call hook for Windows 10 20H1☆483Updated 3 years ago
- Native code virtualizer for x64 binaries☆481Updated 4 months ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆312Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆143Updated 2 years ago
- protector & obfuscator & code virtualizer☆520Updated this week
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆361Updated last year
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆287Updated last year
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆354Updated 5 months ago
- COFF and Portable Executable format described using standard C++ with no dependencies.☆278Updated last month
- Windows inline hooking tool.☆259Updated 6 years ago
- PE Viewer☆175Updated 3 months ago
- Advanced driver monitoring utility.☆207Updated 2 years ago
- A DTrace on Windows Reimplementation☆343Updated 2 months ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆535Updated 3 months ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆376Updated 2 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆267Updated 2 years ago
- Collection of hypervisor detections☆232Updated 6 months ago
- A library to develop kernel level Windows payloads for post HVCI era☆396Updated 3 years ago
- WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API☆559Updated 3 months ago
- 🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engine…☆338Updated 6 months ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆588Updated 2 months ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆275Updated last year
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆277Updated 6 months ago
- Windows NT x64 syscall fuzzer☆602Updated last year
- A modern c++ implementation of windows heavens gate☆218Updated 4 years ago