rcanzanese / SystemCallServiceLinks
Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012
☆21Updated 10 years ago
Alternatives and similar repositories for SystemCallService
Users that are interested in SystemCallService are comparing it to the libraries listed below
Sorting:
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Bootkits Revisited☆40Updated 11 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- ☆34Updated 8 years ago
- Decrement Windows Kernel for fun and profit☆38Updated 7 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Updated 6 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Updated 10 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Updated 7 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆34Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 10 years ago
- Hyper-V sockets☆29Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- ☆50Updated 8 years ago
- ☆34Updated 7 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32Updated 10 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Updated 9 years ago
- CAPE monitor DLLs☆41Updated 6 years ago
- ☆34Updated 4 years ago
- This repository contains some tools that I have written in the past☆28Updated 2 years ago
- User-mode hook bypassing method☆33Updated 9 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 5 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 9 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- metamorphic engine in python☆34Updated 9 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago