Yet another windows internals repo
☆220Aug 29, 2021Updated 4 years ago
Alternatives and similar repositories for WindowsInternals
Users that are interested in WindowsInternals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆149Jun 5, 2023Updated 2 years ago
- ☆24May 21, 2021Updated 4 years ago
- ☆84Aug 26, 2024Updated last year
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- Windows System Programming Experiments☆221Jun 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆151Mar 2, 2023Updated 3 years ago
- ☆166Sep 18, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆21May 28, 2021Updated 4 years ago
- C++ library for low-level Windows development☆80Apr 12, 2024Updated 2 years ago
- ☆23May 28, 2021Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 6 years ago
- ☆22Mar 4, 2019Updated 7 years ago
- The Windows Kernel Programming book samples☆675Sep 25, 2023Updated 2 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Remote memory library in C++17.☆33May 31, 2018Updated 7 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆108May 27, 2021Updated 4 years ago
- x86_64, PE32+, FAT32 bootloader☆29Jul 4, 2021Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- APC Internals Research Code☆172Jun 28, 2020Updated 5 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆332Mar 26, 2024Updated 2 years ago
- IDA Pro plugin to make bitfield accesses easier to grep☆254Aug 3, 2025Updated 8 months ago
- A simple way to spoof return addresses using an exception handler☆45Aug 3, 2022Updated 3 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆722Aug 5, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆568Jan 4, 2025Updated last year
- Proof of concept on how to bypass some limitations of a manual mapped driver☆171Oct 24, 2020Updated 5 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆50Jun 3, 2021Updated 4 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆500May 18, 2021Updated 4 years ago
- My notes while studying Windows internals☆460Mar 27, 2026Updated last month
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆208May 27, 2021Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,286Apr 2, 2026Updated 3 weeks ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆662Jan 28, 2025Updated last year
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆463Jun 15, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆906Nov 21, 2019Updated 6 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆139Oct 20, 2020Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 6 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 6 years ago