windows syscall table from xp ~ 10 rs4
☆356Jun 8, 2018Updated 7 years ago
Alternatives and similar repositories for windows-syscall-table
Users that are interested in windows-syscall-table are comparing it to the libraries listed below
Sorting:
- Examples of leaking Kernel Mode information from User Mode on Windows☆633Jul 7, 2017Updated 8 years ago
- Cross Platform Kernel Fuzzer Framework☆457Oct 11, 2018Updated 7 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆747Jun 26, 2017Updated 8 years ago
- Windbg extension to find PatchGuard pages☆123Jun 24, 2014Updated 11 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- ☆408Mar 1, 2017Updated 8 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- This driver implements the Intel Processor Trace functionality in Intel Skylake architecture for Microsoft Windows☆466Apr 17, 2018Updated 7 years ago
- Toolkit for Hyper-V security research☆157Mar 7, 2022Updated 3 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- Universal PatchGuard and Driver Signature Enforcement Disable☆862Mar 29, 2019Updated 6 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- PatchGuard Research☆304Oct 6, 2018Updated 7 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- VMware Escape Exploit before VMware WorkStation 12.5.5☆914Nov 7, 2023Updated 2 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆141Apr 4, 2017Updated 8 years ago
- network filter driver that control network send speed, based on windows tdi framework.☆31Feb 16, 2024Updated 2 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆1,001Jan 17, 2023Updated 3 years ago
- Windows kernel-mode callbacks tutorial driver☆48Aug 8, 2016Updated 9 years ago
- Research on Windows Kernel Executive Callback Objects☆315Feb 22, 2020Updated 6 years ago
- x64 Kernel Hooks Detection☆24Jan 1, 2017Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Nov 9, 2014Updated 11 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracke…☆408Dec 27, 2024Updated last year
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Jul 22, 2016Updated 9 years ago
- VMAttack PlugIn for IDA Pro☆866Nov 30, 2017Updated 8 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,192Aug 1, 2019Updated 6 years ago