Noah for Windows
☆26Feb 1, 2021Updated 5 years ago
Alternatives and similar repositories for noahx
Users that are interested in noahx are comparing it to the libraries listed below
Sorting:
- ntos shit☆30Feb 15, 2024Updated 2 years ago
- Microsoft decompiled IrDA drivers☆16Apr 15, 2015Updated 10 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- ELF binary file format parser in C☆13Jul 17, 2021Updated 4 years ago
- Simple error lookup for Win32 and NTSTATUS errors☆20Nov 25, 2018Updated 7 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- Windows CryptoAPI wrapper☆15Jan 14, 2023Updated 3 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- Shareds for kernel developement☆29Dec 23, 2013Updated 12 years ago
- ☆17Dec 18, 2020Updated 5 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- A collection of Windows Components(Mostly is ntoskrnl.exe)☆31Nov 16, 2020Updated 5 years ago
- ☆23May 8, 2023Updated 2 years ago
- SV-Assistant☆21Jan 31, 2024Updated 2 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Sep 19, 2014Updated 11 years ago
- Compile time string encryption with NativeAOT☆32Nov 12, 2022Updated 3 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Oct 27, 2017Updated 8 years ago
- Process Orchestration Framework: A camunda 7 fork☆21Mar 2, 2026Updated last week
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆53Oct 14, 2018Updated 7 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆27May 4, 2018Updated 7 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆57Sep 12, 2019Updated 6 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- SDLC Copilot is an Agentic AI system designed to streamline and automate the Software Development Lifecycle (SDLC). From requirement gath…☆23Jun 14, 2025Updated 8 months ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- ☆23Dec 30, 2025Updated 2 months ago
- ☆73Aug 31, 2022Updated 3 years ago
- ☆29Sep 18, 2015Updated 10 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆34Mar 17, 2023Updated 2 years ago
- ☆27May 27, 2017Updated 8 years ago
- 一键调用idat静态分析so、exe、dll, 导出ida数据内容为json文本.☆35Sep 10, 2019Updated 6 years ago
- Mouse emulation driver for Windows 10 x64☆30Aug 7, 2017Updated 8 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago