steveniemitz / SDbgExt2Links
☆28Updated 11 years ago
Alternatives and similar repositories for SDbgExt2
Users that are interested in SDbgExt2 are comparing it to the libraries listed below
Sorting:
- Debugger extension for the Debugging Tools for Windows (WinDbg, KD, CDB, NTSD).☆69Updated 8 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆37Updated 6 years ago
- Diff tool for comparing export tables in PE images☆24Updated 5 years ago
- NTrace -- a function boundary tracing tool for Windows user and kernel mode☆22Updated 11 years ago
- Diff tool for comparing symbols in PDB files☆83Updated 5 years ago
- An attempt to create a friendly version of WinDbg☆105Updated 7 years ago
- ☆106Updated 9 years ago
- ☆21Updated 8 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 9 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 6 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- My commands and scripts extending WinDbg☆41Updated 4 months ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆84Updated last year
- A WDM Windows driver to issue IO to storage devices with asynchronous multithreaded processing☆21Updated 8 years ago
- See your trace statements in Sysinternals Process Monitor☆90Updated 10 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 9 years ago
- Example of real-time Windows ETW packet capture session☆53Updated 8 years ago
- Hex Studio is a work in progress Hex viewer and editor.☆25Updated 8 years ago
- Event Tracing for Windows Custom Events☆21Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆52Updated 7 years ago
- Just another tool to download specify Symbol (.pdb) files☆38Updated 5 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆23Updated 12 years ago
- Windows API hooking project to log all the windows / UIs with the exact timestamp when they are opened.☆14Updated 4 years ago
- Portable Executable parsing library, used by PEExplorer. Also available as a nuget package☆36Updated 7 years ago
- The internal Windows structures hack to create the in-process private ETW session☆13Updated 8 years ago
- ☆23Updated 4 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Updated 9 years ago
- x86_x64 emulator☆16Updated 10 years ago
- Automatically exported from code.google.com/p/windbgshark☆11Updated 10 years ago