microsoft / VbsEnclaveToolingLinks
Supports code generation and SDK functionality for VBS enclaves.
☆16Updated last week
Alternatives and similar repositories for VbsEnclaveTooling
Users that are interested in VbsEnclaveTooling are comparing it to the libraries listed below
Sorting:
- INF Studio for easier working with driver installation files☆39Updated last year
- Reverse Engineering☆13Updated 8 years ago
- The bootloader for the latest versions of Windows NT, Windows 8 to Windows 11.☆24Updated 5 years ago
- Debug Print viewer (user and kernel)☆68Updated last year
- windows_10_shared_source_kit☆48Updated 4 years ago
- Undocumented MSVC☆34Updated last year
- Simple Demo of using Windows Hypervisor Platform☆27Updated last month
- ☆90Updated this week
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆49Updated 4 years ago
- An improved Detours.☆76Updated 3 weeks ago
- ntos shit☆26Updated last year
- Native API header files for the Process Hacker project (nightly).☆26Updated last week
- VM firmware pkg for Project Mu☆41Updated last month
- ntos internals☆22Updated 5 years ago
- View handles and object for each object type☆64Updated 5 years ago
- ☆18Updated 7 years ago
- Project Mu based UEFI SW/FW debugger☆19Updated this week
- Given delta compressed PE files, find download links for them on the Microsoft Symbol Server. No source PE file or VirusTotal access requ…☆30Updated last year
- PdbView shows the contents of PDB files☆93Updated 7 years ago
- Run executables in an AppContainer☆122Updated 6 years ago
- This repository contains some tools that I have written in the past☆28Updated last year
- ☆40Updated 3 months ago
- Various reverse engineering work on Windows☆20Updated 4 years ago
- Code to make it easier to write an NDIS network driver on Windows☆90Updated last year
- windbg open source☆44Updated 11 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.☆28Updated last month
- Runtime smm module loader☆35Updated 2 years ago
- View Windows System in action☆42Updated 2 weeks ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Updated 2 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Updated 7 years ago