zodiacon / ApiSetViewLinks
API Set Viewer
☆89Updated 4 months ago
Alternatives and similar repositories for ApiSetView
Users that are interested in ApiSetView are comparing it to the libraries listed below
Sorting:
- A WinDbg extension to trace COM interactions☆114Updated last year
- ☆61Updated last year
- Run Processes as PPL with ELAM☆163Updated 3 years ago
- ☆70Updated 3 months ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 4 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆143Updated 6 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆121Updated 5 years ago
- Some Code Samples for Windows based Inter-Process-Communication (IPC)☆175Updated last year
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆104Updated 5 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆111Updated 4 years ago
- C++ library for low-level Windows development☆74Updated last year
- Run any executable as SYSTEM account (no service required)☆130Updated last year
- Windows kernel PDB data parsed into YAML☆36Updated 6 months ago
- Samples from my book Windows Native API programming☆67Updated 3 weeks ago
- View handles and object for each object type☆64Updated 5 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆79Updated 2 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- ☆71Updated 2 years ago
- ☆68Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆111Updated 3 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆143Updated 4 years ago
- The Console Monitor Driver is a KMDF kernel-mode filter driver that captures certain Fast I/O operations (input and output) that is sent …☆39Updated 2 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆187Updated 3 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆38Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆76Updated last month
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- Log ALPC activity☆84Updated last year
- DotNext 2019 St. Petersburg Talk Demos☆40Updated 6 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆87Updated 9 years ago
- Example of building an application verifer DLL☆46Updated last year