nccgroup / WindowsJobLockLinks
Windows Process Lockdown Tool using Job Objects
☆70Updated 11 years ago
Alternatives and similar repositories for WindowsJobLock
Users that are interested in WindowsJobLock are comparing it to the libraries listed below
Sorting:
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆55Updated 3 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 4 years ago
- MSTSC Packet Dump Utility☆29Updated 3 years ago
- ☆50Updated 5 years ago
- A ready-made template for a project based on libpeconv.☆49Updated 7 months ago
- Sysmon shenanigans☆66Updated 4 years ago
- Blog posts☆30Updated 5 years ago
- ☆34Updated 8 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 4 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 4 months ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Updated 2 years ago
- Scripts to prepare Windows system for debugging.☆30Updated 4 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- ☆21Updated 4 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- C Header Only Library for Virii☆10Updated 4 years ago
- ☆15Updated 7 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated last year
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- ☆45Updated 7 years ago
- ☆16Updated 11 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- ☆24Updated 6 years ago
- Code Integrity Violation Spotter☆17Updated last year
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Explore Job Objects on a Windows system☆82Updated 6 years ago