vmcall / ntLinks
NT reversal
☆25Updated 6 years ago
Alternatives and similar repositories for nt
Users that are interested in nt are comparing it to the libraries listed below
Sorting:
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆50Updated 4 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- ☆17Updated 4 years ago
- x64 assembler library☆31Updated 11 months ago
- My take on the capcom driver vulnerability☆28Updated 7 years ago
- ☆36Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago
- A Simple Example☆21Updated 6 years ago
- ☆30Updated 2 years ago
- simply manual map any system image☆17Updated 4 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- a dumb rpm/wpm example driver☆15Updated 3 years ago
- A poc that abuses Enclave☆38Updated 2 years ago
- New handle stealing technique for windows apps☆12Updated 7 years ago
- ☆27Updated last year
- Shareds for kernel developement☆28Updated 11 years ago
- battleye shellcode☆18Updated 5 years ago
- ☆48Updated 6 years ago
- ☆24Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 3 years ago
- ☆14Updated 4 years ago
- Logging library for kernel drivers written for the Windows NT operating system.☆19Updated 3 months ago
- ☆38Updated 8 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆19Updated 3 years ago
- bypass CRC☆11Updated 7 years ago
- ☆26Updated last year
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago