m417z / ntdoc
Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers
☆202Updated this week
Alternatives and similar repositories for ntdoc:
Users that are interested in ntdoc are comparing it to the libraries listed below
- Debugger Anti-Detection Benchmark☆303Updated last year
- Single header version of System Informer's phnt library.☆192Updated this week
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆268Updated 3 months ago
- Collection of undocumented Windows API declarations.☆300Updated 2 weeks ago
- Native code virtualizer for x64 binaries☆459Updated last month
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆361Updated last year
- Advanced driver monitoring utility.☆202Updated 2 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆274Updated last year
- An x86-64 Code Virtualizer☆173Updated 4 months ago
- PE Viewer☆163Updated last week
- A DTrace on Windows Reimplementation☆337Updated 3 months ago
- Anti-debugging techniques on a (bad looking) Win32 application.☆235Updated 10 months ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆340Updated 3 months ago
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆289Updated last year
- A library to develop kernel level Windows payloads for post HVCI era☆383Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆245Updated 2 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆149Updated last year
- System call hook for Windows 10 20H1☆485Updated 3 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆133Updated 2 years ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆254Updated 6 months ago
- Collection of hypervisor detections☆212Updated 4 months ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆167Updated 2 years ago
- The Windows Research Kernel (WRK)☆183Updated 8 years ago
- A small x64 library to load dll's into memory.☆430Updated last year
- Perfect DLL Proxying using forwards with absolute paths.☆260Updated 3 months ago
- Windows inline hooking tool.☆241Updated 6 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆260Updated 2 years ago
- RISC-V Virtual Machine☆212Updated last month
- Signtool for expired certificates☆465Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆124Updated 5 months ago