m417z / ntdocLinks
Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers
☆296Updated last week
Alternatives and similar repositories for ntdoc
Users that are interested in ntdoc are comparing it to the libraries listed below
Sorting:
- Collection of undocumented Windows API declarations.☆324Updated 3 weeks ago
- WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API☆603Updated 7 months ago
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆376Updated 2 years ago
- Single header version of System Informer's phnt library.☆229Updated last week
- Debugger Anti-Detection Benchmark☆361Updated last month
- Native code virtualizer for x64 binaries☆502Updated 8 months ago
- protector & obfuscator & code virtualizer☆628Updated this week
- Guided Hacking's official tool to practice bypassing anti-debug techniques.☆285Updated 4 months ago
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆293Updated 2 years ago
- Samples for the book Windows Kernel Programming, 2nd edition☆357Updated last month
- Windows inline hooking tool.☆287Updated 6 years ago
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆374Updated 5 months ago
- An x86-64 Code Virtualizer☆284Updated 11 months ago
- Collection of hypervisor detections☆269Updated 11 months ago
- The Windows Research Kernel (WRK)☆209Updated 8 years ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆411Updated 3 years ago
- LLVM fork with explicit compatibility with MSVC 2022 features.☆336Updated 5 months ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆356Updated 3 years ago
- A DTrace on Windows Reimplementation☆358Updated 7 months ago
- COFF and Portable Executable format described using standard C++ with no dependencies.☆329Updated 4 months ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆304Updated 11 months ago
- PE bin2bin obfuscator☆768Updated 5 months ago
- PE Viewer☆194Updated 3 weeks ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆379Updated 2 months ago
- 🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engine…☆344Updated 10 months ago
- A modern c++ implementation of windows heavens gate☆229Updated 5 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆448Updated 4 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆274Updated 2 years ago
- Simple x86/x64 Assembler/Disassembler/Emulator☆185Updated last year
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆297Updated 2 years ago