nektra / Deviare-InProcLinks
Deviare In Process Instrumentation Engine
☆341Updated 5 years ago
Alternatives and similar repositories for Deviare-InProc
Users that are interested in Deviare-InProc are comparing it to the libraries listed below
Sorting:
- Deviare API Hook☆464Updated 6 years ago
- A Windows API hooking library☆199Updated 3 years ago
- Various extensions for WinDbg☆172Updated 10 years ago
- ☆188Updated 9 years ago
- PDB Downloader - An easier way to download Microsoft's public symbols for Libraries and Executables.☆298Updated 9 years ago
- Detours with just single dependency - NTDLL☆645Updated 2 years ago
- Monitor activity of any driver☆337Updated 4 years ago
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆865Updated 3 weeks ago
- BeaEngine disasm project☆539Updated 4 years ago
- Windows IME-based DLL injection. Able to inject a DLL without OpenProcess or a process handle being necessary..☆183Updated 10 years ago
- Extended Process Monitor-like tool based on Event Tracing for Windows☆473Updated 5 years ago
- x86/x64 C++ Hooking Library☆914Updated 5 years ago
- The ultimate hooking library☆268Updated 4 years ago
- Persistent IAT hooking application - based on bearparser☆259Updated 2 years ago
- ☆226Updated 3 years ago
- Python code to parse Microsoft PDB files☆323Updated 11 months ago
- Portable Executable Explorer☆157Updated 4 years ago
- XEDParse: A MASM-like, single-line plaintext assembler☆174Updated 9 years ago
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆372Updated 6 years ago
- An example sandbox using AppContainer (Windows 8+)☆139Updated 5 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆983Updated 2 years ago
- Source code for File Test - Interactive File System Test Tool☆288Updated 3 months ago
- ☆245Updated 10 years ago
- .NET anti-managed debugger and anti-profiler code☆301Updated 11 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆219Updated 6 years ago
- The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracke…☆388Updated 6 months ago
- .NET Patcher library using dnlib☆322Updated 4 years ago
- WinDBG Anti-RootKit Extension☆634Updated 4 years ago
- KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.☆683Updated 4 months ago
- Debugging Framework for Windows.☆1,203Updated last week