repnz / windows-inspector
A driver to intercept low level windows events
☆62Updated 5 years ago
Alternatives and similar repositories for windows-inspector:
Users that are interested in windows-inspector are comparing it to the libraries listed below
- Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆40Updated 5 years ago
- c++ implementation of windows heavens gate☆68Updated 4 years ago
- Debug Print viewer (user and kernel)☆65Updated last year
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 4 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆94Updated last month
- ☆31Updated 4 years ago
- Miscellaneous Code and Docs☆76Updated last year
- ☆29Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆104Updated 4 years ago
- Record & prevent file deletion in kernel mode☆42Updated 4 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆49Updated 4 years ago
- Static Library For Windows Drivers☆33Updated 3 weeks ago
- Documenting system information classes and their uses☆50Updated 3 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- ☆68Updated 4 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆139Updated 6 years ago
- Library for using direct system calls☆35Updated last month
- Various WinDbg extensions and scripts☆31Updated 6 years ago
- ☆65Updated 6 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆65Updated 6 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 6 years ago
- Library for linking multiple PE\PE + files to one☆46Updated 11 months ago
- Standalone program to download PDB Symbol files for debugging without WDK☆76Updated 5 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆75Updated 14 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆67Updated 4 years ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆48Updated 5 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- ☆58Updated 2 years ago
- This repository contains some tools that I have written in the past☆28Updated last year
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago