nblog / get_syscall_index
get ntdll syscall index
☆12Updated 4 years ago
Alternatives and similar repositories for get_syscall_index:
Users that are interested in get_syscall_index are comparing it to the libraries listed below
- ☆35Updated 4 years ago
- ☆25Updated 7 years ago
- Windows Kernel nt files - To research windows kernel☆15Updated 4 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- hook system call that on user mode☆13Updated 3 years ago
- APC注入DLL内核层☆23Updated 6 years ago
- ☆17Updated 2 years ago
- The driver STL library used by myself☆12Updated 2 years ago
- reveal and detect of common hooks under win32☆13Updated 4 years ago
- A wrapper class to hide the original calling address of a function☆57Updated 4 years ago
- IO隐藏通信封装☆15Updated 3 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆43Updated last month
- ☆46Updated 4 years ago
- ☆18Updated 4 years ago
- eac memory sig maker☆12Updated 3 years ago
- A Simple Example☆21Updated 6 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- Simulate SendInput with ClassService☆31Updated 6 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated last year
- ☆15Updated 5 months ago
- Kernel Hook X64☆21Updated 4 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- ☆19Updated 2 years ago
- ☆34Updated 2 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- simply manual map any system image☆16Updated 4 years ago
- Open Anti Cheat☆27Updated 2 years ago
- ☆15Updated 2 years ago
- MdlReadWriteProcess MDL读写进程数据☆9Updated 5 years ago