yjugl / mitimon
Monitor ETW events for Windows process mitigation policies, with stack traces
☆31Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for mitimon
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆16Updated 2 years ago
- Load Dll into Kernel space☆38Updated 2 years ago
- Windows Console Monitor☆32Updated 5 years ago
- ☆23Updated last year
- Data and structures regarding the research done on WdFilter☆13Updated 4 years ago
- ☆33Updated 4 years ago
- Static Library For Windows Drivers☆30Updated this week
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Updated last year
- Shh0ya Kernel Hook Driver☆19Updated 3 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆19Updated 3 months ago
- What makes it page☆17Updated 2 years ago
- Open Anti Cheat☆27Updated 2 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆22Updated 7 years ago
- ☆15Updated 4 years ago
- Protected Process Light Library☆18Updated 4 years ago
- ntos shit☆21Updated 9 months ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆21Updated 2 weeks ago
- Some crazy PE executables protection kernel driver☆18Updated 4 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Updated 4 years ago
- Code Integrity Violation Spotter☆17Updated 5 months ago
- ☆15Updated last year
- ☆25Updated 3 years ago
- Application Verifier Dynamic Fault Injection☆34Updated last month
- ☆19Updated 6 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- Experiment to use sections as User/Kernelmode comm vector☆21Updated last year
- use ce driver, kernel library.☆13Updated last year