d
☆14Sep 5, 2025Updated 5 months ago
Alternatives and similar repositories for partial
Users that are interested in partial are comparing it to the libraries listed below
Sorting:
- ☆30Aug 24, 2025Updated 6 months ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- ☆13Jan 21, 2019Updated 7 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- 一个32位windows下x86指令集的代码扭曲加密小工具☆33Mar 15, 2019Updated 6 years ago
- Packet Injection With WFP☆16Feb 20, 2023Updated 3 years ago
- enable libemu run pe file and add some good modify☆14Feb 4, 2019Updated 7 years ago
- Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with…☆15Dec 23, 2020Updated 5 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 8 years ago
- Process Hollowing demonstration & explanation☆35Feb 25, 2021Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- 基于WFP的小型网络过滤驱动,拦截百度的DNS,感谢公司前辈们的思路与指导。☆14Aug 19, 2021Updated 4 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- .lib file for linking against the NT CRT☆18Mar 18, 2022Updated 3 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- Shh0ya Kernel Hook Driver☆25Dec 8, 2020Updated 5 years ago
- Learning Various Process Injection Techniques☆17Apr 4, 2019Updated 6 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- Append a custom data payload to a digitally signed NSIS .exe installer☆24Jan 11, 2023Updated 3 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- A C++ wrapper for windows pipes.☆22Apr 17, 2019Updated 6 years ago
- Players' Unknown Battleground Vulnerabilities Test PoC☆18Apr 15, 2019Updated 6 years ago
- ☆27Oct 16, 2017Updated 8 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆31Jun 5, 2024Updated last year
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- Instrumenting a binary without source code to bypass anti-debug checks☆38Sep 25, 2021Updated 4 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Aug 11, 2023Updated 2 years ago
- map driver to memory☆26Aug 26, 2018Updated 7 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.☆33Jul 8, 2025Updated 7 months ago
- ☆48Jun 6, 2025Updated 8 months ago