wyrover / CryptoAPI-examplesLinks
microsoft CryptoAPI examples
☆38Updated 8 years ago
Alternatives and similar repositories for CryptoAPI-examples
Users that are interested in CryptoAPI-examples are comparing it to the libraries listed below
Sorting:
- ☆33Updated 4 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆37Updated 11 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- ☆28Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- just an lite AntiRootkit for interesting☆24Updated 9 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 9 years ago
- a network filter using NDIS hook technique☆19Updated 12 years ago
- PE(compressed dll) memory loader using nt api☆45Updated 8 years ago
- simple PE packer written in C++☆56Updated 7 years ago
- Static library and headers for linking your software with ntdll.dll☆35Updated 5 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Updated 7 years ago
- windows LPC library☆42Updated 12 years ago
- fork HoShiMin Avanguard☆21Updated 6 years ago
- Open Source Libraries Collection☆24Updated 9 years ago
- Library for ETW, ProcessTracker sample based on ETW☆33Updated 8 years ago
- A command line tool to load and unload a device driver.☆47Updated 8 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- ☆14Updated 8 years ago
- ☆29Updated 4 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago
- C++ HTTP 1.1 server & client library with OpenSSL or SChannel (win32 native) TLS support☆25Updated 8 years ago
- Windows anti-rootkit library☆37Updated 10 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆26Updated 11 years ago
- ☆27Updated 6 years ago
- OpenSrc projects; common multiprojects headers store to ./Common/*category*/☆51Updated 11 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Updated 3 years ago
- Kernel-mode file scanner☆18Updated 7 years ago