nblog / get_syscall_indexLinks
get ntdll syscall index
☆12Updated 5 years ago
Alternatives and similar repositories for get_syscall_index
Users that are interested in get_syscall_index are comparing it to the libraries listed below
Sorting:
- Some garbage drivers written for getting started☆66Updated 5 years ago
- ☆35Updated 5 years ago
- Windows Kernel nt files - To research windows kernel☆15Updated 5 years ago
- Communication via callback☆73Updated 6 years ago
- ☆69Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago
- ☆72Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆73Updated 4 years ago
- ☆48Updated 5 years ago
- noob hooking dwm for overlay☆81Updated 5 years ago
- PTE hook☆31Updated last year
- detect hypervisor with Nmi Callback☆41Updated 3 years ago
- Using C++ STL on Windows kernle development☆90Updated 6 years ago
- Detect removed thread from PspCidTable.☆75Updated 3 years ago
- old bypass☆34Updated 7 years ago
- direct systemcalls with a modern c++20 interface.☆45Updated 2 years ago
- ☆27Updated 8 years ago
- ☆144Updated 3 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- the basic version of the ring0 physical memory read/write tool☆90Updated 6 years ago
- 热门网络游戏辅助开发教程☆19Updated 4 years ago
- IDT HOOK KiPageFault test Modified from: github.com/kanren3/x64-IDT-HOOK☆18Updated 5 years ago
- APC注入DLL内核层☆23Updated 7 years ago
- ☆14Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 7 years ago
- ayy debuger☆89Updated last year
- Mapping your code on a 0x1000 size page