wyrover / windows2000
☆33Updated 7 years ago
Alternatives and similar repositories for windows2000
Users that are interested in windows2000 are comparing it to the libraries listed below
Sorting:
- Shared libraries for other projects☆20Updated 2 weeks ago
- DTrace for Windows in userspace; Frontend to ETW☆27Updated 2 years ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtime☆44Updated 2 months ago
- A collection of Windows Components(Mostly is ntoskrnl.exe)☆27Updated 4 years ago
- Debug Print viewer (user and kernel)☆66Updated last year
- c++ implementation of windows heavens gate☆68Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- a ntdll.h head file which download from network, and fix all found problems by me.☆32Updated 4 months ago
- PE Library x86☆21Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Static Library For Windows Drivers☆33Updated 2 months ago
- Alternative Windows C runtime for minimal binary size☆37Updated 9 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆63Updated 8 months ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆15Updated last year
- Extended library for using direct system calls on windows☆16Updated 3 years ago
- Headers for linking your software with ntdll.dll☆15Updated 4 years ago
- ☆46Updated 5 months ago
- Miscellaneous Code and Docs☆81Updated last year
- ☆33Updated 3 years ago
- Various reverse engineering work on Windows☆17Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 3 years ago
- Record & prevent file deletion in kernel mode☆43Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- 这篇文章的目的是介绍一款实验性项目基于COM命名管道或者Windows Hyper-V虚拟机Vmbus通道实现的运行在uefi上的windbg调试引擎开发心得☆38Updated 10 months ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Updated 5 years ago
- Library for using direct system calls☆35Updated 3 months ago
- ☆42Updated 8 years ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- Add an empty section to a PE file☆51Updated 7 years ago