weixu8 / RegistryMonitor
Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun locations and prompting the user whether they want to allow the creation of the key. More of an experiment into Kernel level SSDT hooks but a fun project nonetheless
☆21Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for RegistryMonitor
- WoW64 -> x64☆18Updated 8 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 7 years ago
- windows kernel File redirection☆20Updated 10 years ago
- Some of example code that I have collected while learning☆10Updated 8 years ago
- Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc☆15Updated 6 years ago
- A simple ransomware defender.It uses minifilter to filt "rewrite" and "delete" events in kernel.And it handles event in user mode.☆27Updated 6 years ago
- just an lite AntiRootkit for interesting☆23Updated 8 years ago
- A tool to investigate the Windows device manager☆14Updated 5 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆16Updated 8 years ago
- Kernel (Ring0) - SSDT unhook driver☆13Updated 6 years ago
- Helper utility for debugging windows PE/PE+ loader.☆50Updated 9 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Updated 7 years ago
- ☆27Updated 3 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 10 years ago
- Windows过滤驱动-helloworld☆20Updated 9 years ago
- ☆18Updated 5 years ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆19Updated last year
- ☆13Updated 7 years ago
- Ssdt Hook Detection tool☆12Updated 8 years ago
- Remote memory library in C++17.☆30Updated 6 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆18Updated 8 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆22Updated 9 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆17Updated 2 years ago
- Open Source Libraries Collection☆24Updated 8 years ago
- a network filter using NDIS hook technique☆19Updated 11 years ago
- ☆32Updated 4 years ago
- ☆27Updated 9 years ago
- Windows Simple Process Logger implemented as driver☆18Updated 7 years ago
- Notes my learning steps about Windows-NT☆22Updated 7 years ago
- Various WinDbg extensions and scripts☆31Updated 6 years ago