rogerorr / NtTraceLinks
An strace-like program for the Windows 'native' API
☆268Updated 2 months ago
Alternatives and similar repositories for NtTrace
Users that are interested in NtTrace are comparing it to the libraries listed below
Sorting:
- A header-only C++ library for accessing files in COFF binary format. (Including Windows PE/PE+ formats)☆196Updated 3 months ago
- C++ Exceptions in Windows Drivers☆212Updated 4 years ago
- open source process monitor☆283Updated 2 months ago
- A modern c++ implementation of windows heavens gate☆225Updated 4 years ago
- A Windows PE format file loader☆145Updated 7 years ago
- A Cross-Platform C++ parser library for Windows user minidumps with Python 3 bindings.☆204Updated 7 months ago
- Cross-platform tool that allows browsing and extracting C and C++ type declarations from PDB files.☆327Updated 5 months ago
- Source code for File Test - Interactive File System Test Tool☆287Updated 3 months ago
- COFF and Portable Executable format described using standard C++ with no dependencies.☆320Updated 2 months ago
- A DTrace on Windows Reimplementation☆348Updated 5 months ago
- The ultimate hooking library☆268Updated 4 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆142Updated 6 years ago
- A Windows kernel dump C++ parser library with Python 3 bindings.☆202Updated last year
- Python code to parse Microsoft PDB files☆323Updated 11 months ago
- PDB Downloader - An easier way to download Microsoft's public symbols for Libraries and Executables.☆298Updated 9 years ago
- Detours with just single dependency - NTDLL☆644Updated 2 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆417Updated last year
- A bunch of parsers for PE and PDB formats in C++☆251Updated last year
- ☆168Updated 9 months ago
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆269Updated last week
- awesome windbg extensions☆334Updated 6 years ago
- Print compiler information stored in Rich Header of PE executables.☆138Updated 3 weeks ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆118Updated 5 years ago
- The history of Windows Internals via symbols.☆179Updated 3 years ago
- My personal cheat sheet for using WinDbg for kernel debugging☆426Updated 2 months ago
- Explore Kernel Objects on Windows☆219Updated 3 months ago
- Toy scripts for playing with WinDbg JS API☆233Updated last year
- This project aims to facilitate debugging a kernel driver in windows by adding support for a code change on the fly without reboot/unload…☆172Updated 2 years ago
- Windows NT x64 syscall fuzzer☆615Updated 2 weeks ago
- This is a collection of interesting codes about Windows Process creation.☆234Updated last year