zhuhuibeishadiao / ntoskrnl
The Windows Research Kernel (WRK)
☆183Updated 8 years ago
Alternatives and similar repositories for ntoskrnl:
Users that are interested in ntoskrnl are comparing it to the libraries listed below
- Windows inline hooking tool.☆250Updated 6 years ago
- Voyager - A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆255Updated last year
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆216Updated this week
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆265Updated 2 years ago
- Collection of undocumented Windows API declarations.☆302Updated last month
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆241Updated 3 weeks ago
- A library to develop kernel level Windows payloads for post HVCI era☆389Updated 3 years ago
- System call hook for Windows 10 20H1☆486Updated 3 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆150Updated 5 months ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆199Updated this week
- Browse Page Tables on Windows (Page Table Viewer)☆193Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆135Updated 2 years ago
- Native code virtualizer for x64 binaries☆464Updated 2 months ago
- ☆197Updated last year
- Load your driver like win32k.sys☆252Updated 2 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆263Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆269Updated 4 months ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆140Updated last year
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆201Updated 3 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆129Updated 3 years ago
- Simple Intel VT-x hypervisor☆278Updated last year
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆151Updated 2 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆273Updated last year
- A modern c++ implementation of windows heavens gate☆215Updated 4 years ago
- Easy Anti PatchGuard☆217Updated 3 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆134Updated 5 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆176Updated last year
- Debugger Anti-Detection Benchmark☆305Updated last year
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆138Updated 8 months ago