zodiacon / ALPCLoggerLinks
Log ALPC activity
☆84Updated 2 years ago
Alternatives and similar repositories for ALPCLogger
Users that are interested in ALPCLogger are comparing it to the libraries listed below
Sorting:
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Updated 6 years ago
- windbg plugin for win32k debugging☆75Updated 6 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 5 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆52Updated 4 years ago
- Process Doppelgänging☆161Updated 7 years ago
- Windows RPC Python fuzzer☆163Updated 8 years ago
- Run any executable as SYSTEM account (no service required)☆139Updated last year
- Simple 32/64-bit PEs loader.☆138Updated 6 years ago
- Advance LPC☆70Updated 8 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- 0CCh Windbg extension: include some useful commands☆113Updated 2 years ago
- Explore Job Objects on a Windows system☆82Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆74Updated last year
- Local privilege escalation PoC exploit for CVE-2019-16098☆198Updated 6 years ago
- kernel pool windbg extension☆84Updated 10 years ago
- ☆27Updated 7 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Updated 6 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Updated 5 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆65Updated 5 years ago
- A command tree based on commands and extensions for Windows Kernel Debugging.☆109Updated 5 years ago
- awesome-windows-security-development☆175Updated 7 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆107Updated 10 months ago
- Reverse engineered source code of the autochk rootkit☆206Updated 6 years ago
- ntoskrnl symbol pdb and undocument structures☆25Updated 8 years ago
- View handles and object for each object type☆64Updated 6 years ago
- Elevation of privilege detector based on HyperPlatform☆123Updated 8 years ago
- Inject unsigned DLL into Protected Process Light (PPL)☆28Updated 6 months ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Updated 5 years ago
- Hyper-V Research is trendy now☆189Updated last year