Yet another windows internals repo
☆220Aug 29, 2021Updated 4 years ago
Alternatives and similar repositories for WindowsInternals
Users that are interested in WindowsInternals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆149Jun 5, 2023Updated 2 years ago
- ☆24May 21, 2021Updated 5 years ago
- ☆84Aug 26, 2024Updated last year
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- Windows System Programming Experiments☆221Jun 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆150Mar 2, 2023Updated 3 years ago
- ☆165Sep 18, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- C++ library for low-level Windows development☆82Apr 12, 2024Updated 2 years ago
- ☆23May 28, 2021Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆108Apr 24, 2020Updated 6 years ago
- ☆23Mar 4, 2019Updated 7 years ago
- The Windows Kernel Programming book samples☆675Sep 25, 2023Updated 2 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆261Sep 1, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Remote memory library in C++17.☆33May 31, 2018Updated 7 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆108May 27, 2021Updated 4 years ago
- x86_64, PE32+, FAT32 bootloader☆29Jul 4, 2021Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- APC Internals Research Code☆173Jun 28, 2020Updated 5 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆334Mar 26, 2024Updated 2 years ago
- IDA Pro plugin to make bitfield accesses easier to grep☆255Aug 3, 2025Updated 9 months ago
- A simple way to spoof return addresses using an exception handler☆45Aug 3, 2022Updated 3 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆724Aug 5, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆568Jan 4, 2025Updated last year
- ☆10Apr 19, 2026Updated last month
- Proof of concept on how to bypass some limitations of a manual mapped driver☆170Oct 24, 2020Updated 5 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆50Jun 3, 2021Updated 4 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆506May 18, 2021Updated 5 years ago
- My notes while studying Windows internals☆462Mar 27, 2026Updated last month
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆207May 27, 2021Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,293Apr 2, 2026Updated last month
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆666Jan 28, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆466Jun 15, 2022Updated 3 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆906Nov 21, 2019Updated 6 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆137Oct 20, 2020Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆40Apr 17, 2020Updated 6 years ago
- ☆15Dec 16, 2020Updated 5 years ago