Yet another windows internals repo
☆220Aug 29, 2021Updated 4 years ago
Alternatives and similar repositories for WindowsInternals
Users that are interested in WindowsInternals are comparing it to the libraries listed below
Sorting:
- ☆149Jun 5, 2023Updated 2 years ago
- ☆25May 21, 2021Updated 4 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- Windows System Programming Experiments☆222Jun 13, 2022Updated 3 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆151Mar 2, 2023Updated 3 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- C++ library for low-level Windows development☆81Apr 12, 2024Updated last year
- ☆23May 28, 2021Updated 4 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- ☆24Mar 4, 2019Updated 7 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆260Sep 1, 2022Updated 3 years ago
- ☆84Aug 26, 2024Updated last year
- The Windows Kernel Programming book samples☆667Sep 25, 2023Updated 2 years ago
- ☆166Sep 18, 2021Updated 4 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- x86_64, PE32+, FAT32 bootloader☆28Jul 4, 2021Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- IDA Pro plugin to make bitfield accesses easier to grep☆254Aug 3, 2025Updated 7 months ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆332Mar 26, 2024Updated last year
- A simple way to spoof return addresses using an exception handler☆44Aug 3, 2022Updated 3 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆566Jan 4, 2025Updated last year
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆49Jun 3, 2021Updated 4 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆488May 18, 2021Updated 4 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆723Aug 5, 2020Updated 5 years ago
- My notes while studying Windows internals☆447Dec 9, 2024Updated last year
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆207May 27, 2021Updated 4 years ago
- APC Internals Research Code☆169Jun 28, 2020Updated 5 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆663Jan 28, 2025Updated last year
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆452Jun 15, 2022Updated 3 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,285Feb 14, 2026Updated last month
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆905Nov 21, 2019Updated 6 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 5 years ago