nektra / Deviare-InProcLinks
Deviare In Process Instrumentation Engine
☆341Updated 5 years ago
Alternatives and similar repositories for Deviare-InProc
Users that are interested in Deviare-InProc are comparing it to the libraries listed below
Sorting:
- Deviare API Hook☆465Updated 6 years ago
- A Windows API hooking library☆200Updated 3 years ago
- PDB Downloader - An easier way to download Microsoft's public symbols for Libraries and Executables.☆298Updated 9 years ago
- Various extensions for WinDbg☆173Updated 10 years ago
- Monitor activity of any driver☆339Updated 4 years ago
- ☆190Updated 9 years ago
- Detours with just single dependency - NTDLL☆645Updated 2 years ago
- Extended Process Monitor-like tool based on Event Tracing for Windows☆474Updated 5 years ago
- Python code to parse Microsoft PDB files☆324Updated last year
- BeaEngine disasm project☆539Updated 4 years ago
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆865Updated last month
- An example sandbox using AppContainer (Windows 8+)☆140Updated 5 years ago
- Persistent IAT hooking application - based on bearparser☆260Updated 2 years ago
- x86/x64 C++ Hooking Library☆918Updated 5 years ago
- The ultimate hooking library☆270Updated 4 years ago
- Portable Executable Explorer☆158Updated 4 years ago
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆372Updated 6 years ago
- Windows IME-based DLL injection. Able to inject a DLL without OpenProcess or a process handle being necessary..☆183Updated 11 years ago
- Debugging Framework for Windows.☆1,203Updated last month
- ☆242Updated 10 years ago
- .NET Patcher library using dnlib☆322Updated 4 years ago
- XEDParse: A MASM-like, single-line plaintext assembler☆175Updated 9 years ago
- ☆226Updated 3 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆987Updated 2 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆220Updated 6 years ago
- Libraries for extending WinDbg and its underlying components.☆114Updated 3 months ago
- The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracke…☆390Updated 7 months ago
- WinDBG Anti-RootKit Extension☆635Updated 5 years ago
- KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.☆689Updated 4 months ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆744Updated 8 years ago