patrickmatula / Windows-Internals-Learning-Resources
☆97Updated 3 months ago
Alternatives and similar repositories for Windows-Internals-Learning-Resources:
Users that are interested in Windows-Internals-Learning-Resources are comparing it to the libraries listed below
- ☆103Updated 4 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- ☆155Updated 10 months ago
- Recon 2023 slides and code☆79Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆134Updated last year
- "Service-less" driver loading☆148Updated 3 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated last year
- ☆111Updated last month
- ☆105Updated 8 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- ☆114Updated last year
- ☆149Updated 3 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆138Updated 2 weeks ago
- ☆107Updated last year
- Tools for analyzing EDR agents☆221Updated 9 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆106Updated 6 months ago
- Windows rootkit designed to work with BYOVD exploits☆169Updated 2 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated last month
- ☆136Updated 4 months ago
- A Mythic Agent written in PIC C.☆183Updated last month
- Admin to Kernel code execution using the KSecDD driver☆244Updated 11 months ago
- Analyse MSI files for vulnerabilities☆125Updated 6 months ago
- Local & remote Windows DLL Proxying☆162Updated 9 months ago
- early cascade injection PoC based on Outflanks blog post☆207Updated 4 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆76Updated 6 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆96Updated 11 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆106Updated 8 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆194Updated 2 months ago