nektra / Deviare-InProcLinks
Deviare In Process Instrumentation Engine
☆341Updated 5 years ago
Alternatives and similar repositories for Deviare-InProc
Users that are interested in Deviare-InProc are comparing it to the libraries listed below
Sorting:
- Deviare API Hook☆467Updated 6 years ago
- A Windows API hooking library☆200Updated 3 years ago
- Various extensions for WinDbg☆173Updated 11 years ago
- PDB Downloader - An easier way to download Microsoft's public symbols for Libraries and Executables.☆299Updated 9 years ago
- ☆190Updated 9 years ago
- Monitor activity of any driver☆342Updated 4 years ago
- Detours with just single dependency - NTDLL☆648Updated 3 years ago
- Portable Executable Explorer☆158Updated 4 years ago
- BeaEngine disasm project☆541Updated 4 years ago
- Persistent IAT hooking application - based on bearparser☆258Updated 2 years ago
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆869Updated 2 months ago
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆375Updated 6 years ago
- The ultimate hooking library☆272Updated 4 years ago
- x86/x64 C++ Hooking Library☆917Updated 5 years ago
- Debugging Framework for Windows.☆1,204Updated last week
- ☆242Updated 10 years ago
- .NET Patcher library using dnlib☆323Updated 4 years ago
- Windows IME-based DLL injection. Able to inject a DLL without OpenProcess or a process handle being necessary..☆183Updated 11 years ago
- An example sandbox using AppContainer (Windows 8+)☆140Updated 5 years ago
- Python code to parse Microsoft PDB files☆324Updated last year
- Extended Process Monitor-like tool based on Event Tracing for Windows☆475Updated 5 years ago
- The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracke…☆391Updated 8 months ago
- Inject C# code into a running process☆341Updated last year
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆987Updated 2 years ago
- ☆225Updated 3 years ago
- XEDParse: A MASM-like, single-line plaintext assembler☆172Updated 9 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆220Updated 6 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆364Updated 10 years ago
- x64dbg utility for linker map files, diff files, PEiD/IDA signatures, and code signature generation.☆296Updated 4 years ago
- .NET anti-managed debugger and anti-profiler code☆301Updated 11 years ago