File system minifilter driver for Windows to block symbolic link attacks.
☆51Dec 16, 2020Updated 5 years ago
Alternatives and similar repositories for SymlinkProtect
Users that are interested in SymlinkProtect are comparing it to the libraries listed below
Sorting:
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 4 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 3 years ago
- What makes it page☆17Aug 24, 2022Updated 3 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Rootkit & Anti-rootkit☆42Jan 27, 2024Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Basic experimentation with Windows drivers.☆17Mar 3, 2023Updated 2 years ago
- Static Library For Windows Drivers☆41Dec 13, 2025Updated 2 months ago
- Analyze Windows x64 Kernel Memory Layout☆129Nov 19, 2020Updated 5 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆47Jun 3, 2021Updated 4 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Kernel Pool Monitor☆127Mar 6, 2022Updated 3 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆149Mar 2, 2023Updated 2 years ago
- A research project about Windows notify routines.☆38Jul 31, 2020Updated 5 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Sep 18, 2020Updated 5 years ago
- ☆18Oct 12, 2014Updated 11 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- DTrace for Windows in userspace; Frontend to ETW☆27Oct 4, 2022Updated 3 years ago
- Enumerate user mode shared memory mappings on Windows.☆128Feb 14, 2021Updated 5 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- Ransomware detection application for Windows using Windows Minifilter driver☆93Jun 6, 2020Updated 5 years ago
- D☆44May 3, 2021Updated 4 years ago
- Reverse engineered source code of the autochk rootkit☆209Nov 1, 2019Updated 6 years ago
- A minifilter driver preserves all modified and deleted files.☆79Jul 17, 2015Updated 10 years ago
- DllInject (Memory Load)☆11Jan 5, 2019Updated 7 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- 扫描以及恢复 r3hook 类☆10Aug 29, 2021Updated 4 years ago