Yet another windows internals repo
☆219Aug 29, 2021Updated 4 years ago
Alternatives and similar repositories for WindowsInternals
Users that are interested in WindowsInternals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆149Jun 5, 2023Updated 2 years ago
- ☆24May 21, 2021Updated 4 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- Windows System Programming Experiments☆221Jun 13, 2022Updated 3 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆151Mar 2, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- x64 Windows privilege elevation using anycall☆21May 28, 2021Updated 4 years ago
- C++ library for low-level Windows development☆80Apr 12, 2024Updated last year
- ☆23May 28, 2021Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- ☆22Mar 4, 2019Updated 7 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆262Sep 1, 2022Updated 3 years ago
- ☆84Aug 26, 2024Updated last year
- The Windows Kernel Programming book samples☆673Sep 25, 2023Updated 2 years ago
- ☆165Sep 18, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Remote memory library in C++17.☆33May 31, 2018Updated 7 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆108May 27, 2021Updated 4 years ago
- x86_64, PE32+, FAT32 bootloader☆29Jul 4, 2021Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- IDA Pro plugin to make bitfield accesses easier to grep☆253Aug 3, 2025Updated 8 months ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆332Mar 26, 2024Updated 2 years ago
- A simple way to spoof return addresses using an exception handler☆44Aug 3, 2022Updated 3 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆568Jan 4, 2025Updated last year
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- x64 Windows implementation of virtual-address to physical-address translation☆49Jun 3, 2021Updated 4 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆494May 18, 2021Updated 4 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆721Aug 5, 2020Updated 5 years ago
- My notes while studying Windows internals☆457Mar 27, 2026Updated 2 weeks ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆208May 27, 2021Updated 4 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆662Jan 28, 2025Updated last year
- APC Internals Research Code☆171Jun 28, 2020Updated 5 years ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆456Jun 15, 2022Updated 3 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,285Apr 2, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆904Nov 21, 2019Updated 6 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆139Oct 20, 2020Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 5 years ago