zhuhuibeishadiao / ntoskrnlLinks
The Windows Research Kernel (WRK)
☆200Updated 8 years ago
Alternatives and similar repositories for ntoskrnl
Users that are interested in ntoskrnl are comparing it to the libraries listed below
Sorting:
- Windows inline hooking tool.☆275Updated 6 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆333Updated 3 years ago
- Collection of undocumented Windows API declarations.☆318Updated last month
- Easy Anti PatchGuard☆222Updated 4 years ago
- System call hook for Windows 10 20H1☆494Updated 4 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆250Updated 5 months ago
- LLVM fork with explicit compatibility with MSVC 2022 features.☆316Updated 3 months ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆290Updated 4 months ago
- Browse Page Tables on Windows (Page Table Viewer)☆212Updated 3 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆282Updated 2 years ago
- Samples for the book Windows Kernel Programming, 2nd edition☆345Updated 6 months ago
- Kernel driver for detecting Intel VT-x hypervisors.☆189Updated 2 years ago
- Load your driver like win32k.sys☆255Updated 2 years ago
- Collect various versions of ntoskrnl files☆54Updated last year
- COFF and Portable Executable format described using standard C++ with no dependencies.☆320Updated 2 months ago
- Ghetto user mode emulation of Windows kernel drivers.☆142Updated 8 months ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆142Updated 6 years ago
- Simple Intel VT-x hypervisor☆324Updated last year
- Native code virtualizer for x64 binaries☆490Updated 6 months ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆145Updated last year
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆153Updated last year
- Debugger Anti-Detection Benchmark☆339Updated this week
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆205Updated 4 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆273Updated 2 years ago
- A native hypervisor designed for the Windows operating system☆123Updated 4 years ago
- a minimalistic windows hypervisor for amd processors☆122Updated 3 years ago
- ☆212Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆345Updated 2 years ago
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆271Updated this week
- Use ci.dll API for validating Authenticode signature of files☆142Updated 3 years ago