sreeharshabandi / CaptainLinks
Process Creation, Image Load and Thread Creation Notification
☆13Updated 2 years ago
Alternatives and similar repositories for Captain
Users that are interested in Captain are comparing it to the libraries listed below
Sorting:
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Updated 3 years ago
- ☆15Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆23Updated last year
- A simple example how to decrypt kernel debugger data block☆30Updated 4 years ago
- Static Library For Windows Drivers☆38Updated 2 months ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- ☆31Updated 3 years ago
- ☆23Updated 2 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆14Updated 6 years ago
- An example code of CiGetCertPublisherName☆17Updated 3 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 3 years ago
- x64 assembler library☆31Updated last year
- Load Dll into Kernel space☆38Updated 3 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- Analysing and defeating PatchGuard universally☆36Updated 4 years ago
- Protected Process Light Library☆18Updated 5 years ago
- ☆26Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆42Updated 4 years ago
- ☆23Updated 2 years ago
- ☆32Updated 4 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆23Updated 3 years ago
- ☆27Updated 2 years ago
- Application Verifier Dynamic Fault Injection☆39Updated last month
- Binary DisASseMbler☆24Updated 3 years ago
- ☆26Updated 6 years ago
- ☆28Updated last year
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- Some crazy PE executables protection kernel driver☆19Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Updated 3 years ago