sreeharshabandi / CaptainLinks
Process Creation, Image Load and Thread Creation Notification
☆13Updated 2 years ago
Alternatives and similar repositories for Captain
Users that are interested in Captain are comparing it to the libraries listed below
Sorting:
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Updated 4 years ago
- A simple example how to decrypt kernel debugger data block☆31Updated 4 years ago
- ☆15Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Static Library For Windows Drivers☆41Updated 3 weeks ago
- x64 assembler library☆31Updated last year
- ☆23Updated 2 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- An example code of CiGetCertPublisherName☆17Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- Protected Process Light Library☆18Updated 5 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆27Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆24Updated last year
- ☆31Updated 3 years ago
- A poc that abuses Enclave☆40Updated 3 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- ☆25Updated 2 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Updated 3 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- ☆53Updated 3 years ago
- Load Dll into Kernel space☆39Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- Application Verifier Dynamic Fault Injection☆39Updated 4 months ago
- ☆23Updated 2 years ago
- Rootkit & Anti-rootkit☆41Updated last year
- ☆29Updated last year
- windows kernel pagehook☆40Updated 3 years ago
- direct systemcalls with a modern c++20 interface.☆45Updated 3 years ago
- Exports monitoring plugin for x64dbg☆22Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Updated 4 years ago