zodiacon / DepWalkLinks
โ39Updated 4 months ago
Alternatives and similar repositories for DepWalk
Users that are interested in DepWalk are comparing it to the libraries listed below
Sorting:
- Debug Print viewer (user and kernel)โ68Updated last year
- ๐งถ The Win32 usermode threading library with UMS/fibers/threads supportโ30Updated 6 years ago
- A class to gather information about a process, its threads and modules.โ23Updated 5 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.โ29Updated 2 months ago
- Analysing and defeating PatchGuard universallyโ35Updated 4 years ago
- x64 assembler libraryโ31Updated last year
- Example of hijacking system calls via function pointer tablesโ31Updated 4 years ago
- INF Studio for easier working with driver installation filesโ39Updated last year
- โ46Updated 6 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fuโฆโ44Updated 2 years ago
- c++ implementation of windows heavens gateโ70Updated 4 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.โ27Updated 5 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an objectโ50Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)โ35Updated 6 years ago
- Remote memory library in C++17.โ33Updated 7 years ago
- โ56Updated 4 months ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weaknessโ53Updated 6 years ago
- (DEPRECATED) A simple anti-anti debug library for Windowsโ30Updated 5 years ago
- Sample for Creating a new kernel object type and supporting APIโ26Updated last year
- Injector with kernel powerโ16Updated 4 years ago
- Static Library For Windows Driversโ37Updated last month
- Windows Console Monitorโ34Updated 6 years ago
- โ37Updated 4 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)โ43Updated 7 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hookingโ54Updated 3 years ago
- View handles and object for each object typeโ64Updated 6 years ago
- โ32Updated 4 years ago
- A sample on how to inject a DLL from a kernel driverโ62Updated 9 years ago
- Bypasses for Windows kernel callbacks PatchGuard protectionโ43Updated 4 years ago
- View Windows System in actionโ41Updated 2 months ago