toolboc / Windows-Research-Kernel-HackingLinks
Operating Systems technical challenge based on the Windows Research Kernel
☆174Updated 5 years ago
Alternatives and similar repositories for Windows-Research-Kernel-Hacking
Users that are interested in Windows-Research-Kernel-Hacking are comparing it to the libraries listed below
Sorting:
- My repository to upload drivers from different books and all the information related to windows internals.☆163Updated 6 years ago
- Hyper-V Research is trendy now☆179Updated last week
- (unofficial) Hyper-V® Development Kit☆232Updated last year
- A very simple hypervisor for learning experience.☆147Updated 4 years ago
- The Windows Research Kernel v1.2 contains the sources for the core of the Windows (NTOS) kernel and a build environment for a kernel that…☆88Updated 7 years ago
- Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that w…☆395Updated 7 years ago
- VT-based PCI device monitor (SPI)☆157Updated 5 years ago
- Hypervisor based tool for monitoring system register accesses.☆152Updated 7 years ago
- TLB splitting VMM☆169Updated 9 years ago
- A software driver that lets you log kernel-mode debug output into a file on Windows.☆108Updated 7 years ago
- Kernel Detective☆150Updated 3 years ago
- The history of Windows Internals via symbols.☆181Updated 4 years ago
- ☆228Updated 4 years ago
- Windows NT4 Kernel Source code☆331Updated 14 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆230Updated 5 years ago
- Debugging Framework for Windows.☆1,197Updated 3 weeks ago
- Elevation of privilege detector based on HyperPlatform☆123Updated 8 years ago
- Automatically exported from code.google.com/p/virtdbg☆99Updated 10 years ago
- Simple Protected Mode Kernel for i386☆15Updated 6 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Updated 7 years ago
- IntelVT-X nice feature -> tool☆95Updated 11 years ago
- AMD64 PE Emulator in Python.☆85Updated 2 years ago
- Print compiler information stored in Rich Header of PE executables.☆146Updated 2 weeks ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆146Updated 5 years ago
- Toy scripts for playing with WinDbg JS API☆244Updated last year
- Hyper-V Research is trendy now☆192Updated last year
- Translates WinDbg "dt" structure dump to a C structure☆134Updated 9 years ago
- Automatically exported from code.google.com/p/hyperdbg☆109Updated 10 years ago
- MASM32 Code collection for reverse engineers☆158Updated 4 months ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆226Updated 7 years ago