swatkat / arkitlib
Windows anti-rootkit library
☆38Updated 9 years ago
Alternatives and similar repositories for arkitlib:
Users that are interested in arkitlib are comparing it to the libraries listed below
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- A command line tool to load and unload a device driver.☆47Updated 7 years ago
- Helper utility for debugging windows PE/PE+ loader.☆51Updated 9 years ago
- ☆27Updated 5 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆45Updated 8 years ago
- Analyze PatchGuard☆55Updated 6 years ago
- 内核级ARK工具。☆59Updated 8 years ago
- Polymorphic Stub Creator☆32Updated 7 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 6 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 7 years ago
- ☆23Updated 7 years ago
- Wow64 syscall hook☆40Updated 7 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆37Updated 10 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆31Updated 6 years ago
- A-Protect Anti Rootkit Tool☆53Updated 11 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated 8 months ago
- 大表哥的Syscall-Monitor☆34Updated 5 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago
- ☆27Updated 9 years ago
- map driver to memory☆25Updated 6 years ago
- ☆35Updated 9 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 9 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆75Updated 14 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- createfile☆48Updated 9 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- reversed emet tool☆24Updated 12 years ago
- Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc☆16Updated 6 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- ☆33Updated 4 years ago