m417z / winapiexec
A small tool that allows to run WinAPI functions through command line parameters
☆176Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for winapiexec
- PE Viewer☆152Updated 3 weeks ago
- A global injection and hooking example☆125Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.☆271Updated 4 months ago
- C# Utilities for Windows Notification Facility☆125Updated 6 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆237Updated 2 years ago
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆163Updated last week
- Authenticode Hash Calculator for PE32/PE32+ files☆107Updated 8 months ago
- Comparing, discussing, and bypassing various techniques for suspending and freezing processes on Windows.☆114Updated 3 years ago
- Explore Kernel Objects on Windows☆200Updated 10 months ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆261Updated last month
- Advanced driver monitoring utility.☆201Updated 2 years ago
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆292Updated 8 months ago
- A tabbed UI for Microsoft's Hyper-V☆202Updated 3 months ago
- Signtool for expired certificates☆455Updated last year
- Controlling Windows PP(L)s☆263Updated last year
- For when DLLMain is the only way☆353Updated 3 weeks ago
- RPC Monitor tool based on Event Tracing for Windows☆330Updated 3 months ago
- Windows Filtering Platform Explorer☆211Updated last month
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆231Updated last year
- myAut2Exe - The Open Source AutoIT Script Decompiler☆70Updated 6 years ago
- ☆134Updated 2 years ago
- Single header version of System Informer's phnt library.☆186Updated this week
- Yet another PE Viewer☆138Updated last year
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆199Updated 2 years ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆329Updated this week
- Generate a proxy dll for arbitrary dll☆145Updated last month
- Load a dynamic library from memory by modifying the native Windows loader☆204Updated last year
- Sysmon-Like research tool for ETW☆336Updated 2 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆315Updated 2 years ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆164Updated 10 months ago