punishell / WindowsLegacyCVELinks
☆10Updated 5 years ago
Alternatives and similar repositories for WindowsLegacyCVE
Users that are interested in WindowsLegacyCVE are comparing it to the libraries listed below
Sorting:
- R3劫持所有异常☆15Updated 5 years ago
- An attempt at reversing WindowsDefender☆20Updated last year
- Interprocess communication library, providing the ability to call functions from each other☆20Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- ☆31Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Updated 4 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 4 years ago
- Dump mapped PE files from memory to the disk☆20Updated 6 years ago
- ☆29Updated 3 years ago
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Updated 8 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Updated 5 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Code Integrity Violation Spotter☆17Updated last year
- A kernel mode Windows rootkit in development.☆49Updated 4 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Updated 4 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Updated 4 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 6 years ago
- ☆59Updated 3 years ago
- ☆20Updated 2 years ago
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation☆16Updated 8 years ago
- ☆25Updated 4 years ago
- Protected Process Light Library☆18Updated 5 years ago
- This repository contains some tools that I have written in the past☆28Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- Walks through the 4-level paging structures in Windows x64☆13Updated 2 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Updated 4 years ago
- SetWinEventHook Sample☆50Updated 2 years ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆42Updated 7 months ago
- Learning Various Process Injection Techniques☆17Updated 6 years ago