nptr / no-crt-templateLinks
simple c++ visual studio project that doesn't use the C/C++ runtime
☆25Updated 7 years ago
Alternatives and similar repositories for no-crt-template
Users that are interested in no-crt-template are comparing it to the libraries listed below
Sorting:
- Compileable POC of namazso's x64 return address spoofer.☆52Updated 4 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆63Updated 9 months ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- ☆40Updated 3 months ago
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆30Updated 10 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆87Updated 2 months ago
- Elevate arbitrary MSR writes to kernel execution.☆36Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 11 months ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Updated last year
- ☆113Updated 2 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆31Updated 3 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆81Updated 6 years ago
- Next gen process injection technique☆53Updated 4 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆76Updated last month
- silence file system monitoring components by hooking their minifilters☆57Updated last year
- Finding Truth in the Shadows☆92Updated 2 years ago
- Header-only C++ library for producing PE files.☆33Updated last year
- Minifilter Callback Patching Proof-of-Concept☆71Updated 2 years ago
- SetWinEventHook Sample☆47Updated last year
- ☆82Updated 9 months ago
- List the ETW provider(s) in the registration table of a process.☆59Updated last year
- kernel to user mode APC injector☆44Updated 3 years ago
- An example MS-W32T client to show how to use midl.exe in a project managed by CMake☆11Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆105Updated 2 years ago
- ☆71Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆92Updated 4 years ago
- ☆14Updated last year
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated last year
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆36Updated 4 months ago