x-tinkerer / WRKLinks
☆66Updated 12 years ago
Alternatives and similar repositories for WRK
Users that are interested in WRK are comparing it to the libraries listed below
Sorting:
- C++ Exceptions in Windows Drivers☆221Updated 5 years ago
- Use ci.dll API for validating Authenticode signature of files☆164Updated 3 years ago
- Intercepting DeviceControl via WPP☆136Updated 6 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆115Updated 4 years ago
- A library to read physical memory and system-wide virtual memory.☆128Updated 7 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆158Updated last year
- Collect different versions of Crucial modules.☆144Updated last year
- Enable SEH support for manual mapped x86-32bit PEs☆69Updated 6 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆232Updated 3 years ago
- ☆99Updated 8 years ago
- ☆51Updated 5 years ago
- A hypervisor hiding user-mode memory using EPT☆107Updated 8 years ago
- Disks for DMA☆134Updated 4 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆114Updated 9 years ago
- a minimalistic windows hypervisor for amd processors☆136Updated 3 years ago
- Translates WinDbg "dt" structure dump to a C structure☆134Updated 9 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆111Updated 5 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Updated 10 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆89Updated 2 years ago
- A native hypervisor designed for the Windows operating system☆125Updated 4 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Updated 6 years ago
- 🪝 Various EPT hook detection approaches☆142Updated 6 months ago
- Kernel driver for detecting Intel VT-x hypervisors.☆192Updated 2 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Updated 2 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Updated 6 years ago
- ☆156Updated 6 years ago
- ☆127Updated 5 years ago
- ☆176Updated last year
- Collect various versions of ntoskrnl files☆59Updated 2 years ago