pvthuyet / windows-kernel-programmingLinks
Windows kernel
☆12Updated 4 years ago
Alternatives and similar repositories for windows-kernel-programming
Users that are interested in windows-kernel-programming are comparing it to the libraries listed below
Sorting:
- ☆26Updated 4 months ago
- ☆10Updated 6 months ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆39Updated last year
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- ☆12Updated 2 years ago
- API Hammering with C++20☆49Updated 2 years ago
- Process Injection: APC Injection☆33Updated 4 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆22Updated 2 months ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆34Updated 3 years ago
- Offensive Assembly code snippets.☆12Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Updated last year
- ☆31Updated last year
- really ?☆12Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆22Updated 3 months ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆31Updated 11 months ago
- ☆17Updated 11 months ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆19Updated 2 years ago
- Released presentations of my talks + code that used during these talks☆14Updated 10 months ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆14Updated 8 months ago
- Small tool to play with IOCs caused by Imageload events☆42Updated 2 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆14Updated last year