nfedera / run-as-trustedinstaller
☆42Updated 8 years ago
Alternatives and similar repositories for run-as-trustedinstaller:
Users that are interested in run-as-trustedinstaller are comparing it to the libraries listed below
- ☆46Updated 4 months ago
- c++ implementation of windows heavens gate☆68Updated 4 years ago
- ☆31Updated 4 years ago
- INF Studio for easier working with driver installation files☆37Updated last year
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Updated 5 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆46Updated 2 years ago
- Record & prevent file deletion in kernel mode☆42Updated 4 years ago
- (This is a fork used primarily to submit patches into upstream repository) RpcView is a free tool to explore and decompile Microsoft RPC …☆19Updated last year
- View Windows System in action☆39Updated last month
- ☆26Updated 5 years ago
- Debug Print viewer (user and kernel)☆66Updated last year
- SetWinEventHook Sample☆47Updated last year
- Execute commands as local system.☆64Updated 5 years ago
- BITS Transfers Manager☆41Updated last month
- Injector with kernel power☆16Updated 4 years ago
- Windows Registry Remapper, lets you run an Application with a foreign Registry dump file☆26Updated 9 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 5 years ago
- Windows Console Monitor☆33Updated 5 years ago
- Static Library For Windows Drivers☆33Updated 2 months ago
- Elevate arbitrary MSR writes to kernel execution.☆33Updated last year
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- Runs programs as TrustedInstaller☆49Updated 5 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 5 years ago
- A Windows API hooking library !☆31Updated 2 years ago
- A library with four different methods to execute shellcode in a process☆24Updated 5 years ago
- ☆25Updated 2 years ago
- Trace events in real time sessions☆45Updated last year
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Load and unload a DLL into an remote process without using WriteProcessMemory ;)☆16Updated 10 years ago