Operating Systems technical challenge based on the Windows Research Kernel
☆175Nov 17, 2020Updated 5 years ago
Alternatives and similar repositories for Windows-Research-Kernel-Hacking
Users that are interested in Windows-Research-Kernel-Hacking are comparing it to the libraries listed below
Sorting:
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- A simple DLL that can intercept HID messages and pass them on to the real HID DLL, while logging the data.☆22Oct 3, 2014Updated 11 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆240Nov 6, 2019Updated 6 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- View handles and object for each object type☆64Sep 1, 2019Updated 6 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Jul 11, 2018Updated 7 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- Open Course for diving security internal☆52Nov 11, 2019Updated 6 years ago
- Intel Virtualization Technology demo☆73Oct 15, 2016Updated 9 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Jan 24, 2011Updated 15 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- OpenSrc projects; common multiprojects headers store to ./Common/*category*/☆51Mar 16, 2014Updated 11 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- Collect different versions of Crucial modules.☆145Jul 11, 2024Updated last year
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- The Win32 Anti-Intrusion Library☆213May 30, 2019Updated 6 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- Simple driver to register all available process, thread, image, Registry, and Object callbacks☆124Oct 5, 2017Updated 8 years ago
- windows 系统API C++封装库,包含进程间通讯,互斥,内存队列等通用功能☆55Aug 25, 2016Updated 9 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆634Jul 7, 2017Updated 8 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆84Aug 24, 2024Updated last year
- Use Windows Management Instrumentation interfaces to perform actions on a Windows system from a Linux System☆16Mar 15, 2012Updated 13 years ago
- VT-based PCI device monitor (SPI)☆158Oct 29, 2020Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago