rmccrystal / winutilLinks
A collection of util functions for Windows written in Rust
☆9Updated 2 years ago
Alternatives and similar repositories for winutil
Users that are interested in winutil are comparing it to the libraries listed below
Sorting:
- Cheat Engine alternative written in Rust☆12Updated 2 years ago
- x64 jit assembler☆12Updated 3 weeks ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆19Updated last year
- ☆20Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆42Updated 3 years ago
- a parser for the .map file included in the aimware leak☆17Updated 2 years ago
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- ☆38Updated 2 years ago
- An xtask to speed up Windows kernel driver development in rust.☆19Updated 10 months ago
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆25Updated 2 years ago
- A kdmapper library for Rust☆17Updated 3 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- A proof-of-concept to abuse EQU8 anti-cheat kernel driver☆14Updated 3 years ago
- Single header library to simplify the usage of direct syscalls. x64/x86☆11Updated 2 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 3 years ago
- Dumps VAC(Valve Anti-Cheat) modules that get streamed and mapped while playing a VAC protected game☆1Updated last month
- A efi-runner and message logger for vmware.☆12Updated last month
- RWX Section Abusing☆17Updated last year
- x64 Windows privilege elevation using anycall☆21Updated 4 years ago
- PhysPatch performs physical memory scanning and patching of the entire Windows Kernel using DMA☆12Updated 6 months ago
- PDB Rewriting Rust Library☆24Updated last year
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with…☆16Updated 4 years ago
- A simple way to spoof return addresses using an exception handler☆31Updated 2 years ago
- My research WIP bluepill hypervisor☆41Updated 2 years ago
- x64 assembler library☆31Updated 11 months ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 9 months ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆17Updated 2 years ago