KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.
☆755Mar 9, 2026Updated last week
Alternatives and similar repositories for krabsetw
Users that are interested in krabsetw are comparing it to the libraries listed below
Sorting:
- Sysmon-Like research tool for ETW☆387Nov 15, 2022Updated 3 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆330May 2, 2024Updated last year
- View ETW Provider manifest☆576Nov 1, 2024Updated last year
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 4 years ago
- ☆826Jun 1, 2023Updated 2 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆301Apr 10, 2021Updated 4 years ago
- Process Monitor X v2☆651Jan 22, 2024Updated 2 years ago
- Document ETW providers☆276Mar 28, 2020Updated 5 years ago
- Ruxcon2016 POC Code☆141Nov 21, 2016Updated 9 years ago
- User interface for recording and managing ETW traces☆1,651May 28, 2025Updated 9 months ago
- Event Tracing For Windows (ETW) Resources☆420Oct 30, 2025Updated 4 months ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆198Dec 6, 2022Updated 3 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,049Sep 24, 2023Updated 2 years ago
- ETW Python Library☆293Aug 11, 2023Updated 2 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,274May 1, 2024Updated last year
- Windows Object Explorer 64-bit☆1,893Mar 9, 2026Updated last week
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆320Mar 20, 2024Updated 2 years ago
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆895Jun 18, 2025Updated 9 months ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,276Nov 6, 2025Updated 4 months ago
- Windows System Explorer☆878Nov 29, 2025Updated 3 months ago
- Recon 2015 Presentation from Alex Ionescu☆250Jan 27, 2016Updated 10 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Nov 30, 2017Updated 8 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆843Mar 11, 2021Updated 5 years ago
- Analyze Windows x64 Kernel Memory Layout☆130Nov 19, 2020Updated 5 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,340Mar 7, 2026Updated 2 weeks ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆266Nov 18, 2022Updated 3 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆434Aug 16, 2023Updated 2 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆748Jun 26, 2017Updated 8 years ago
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,734Nov 24, 2023Updated 2 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,362Jan 22, 2022Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,285Feb 14, 2026Updated last month
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆587Jan 24, 2023Updated 3 years ago
- C++ Exceptions in Windows Drivers☆222Dec 21, 2020Updated 5 years ago
- WinDBG Anti-RootKit Extension☆646Jul 29, 2020Updated 5 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆56Jul 8, 2022Updated 3 years ago