View ETW Provider manifest
☆576Nov 1, 2024Updated last year
Alternatives and similar repositories for EtwExplorer
Users that are interested in EtwExplorer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sysmon-Like research tool for ETW☆387Nov 15, 2022Updated 3 years ago
- ☆826Jun 1, 2023Updated 2 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆330May 2, 2024Updated last year
- Event Tracing For Windows (ETW) Resources☆421Oct 30, 2025Updated 4 months ago
- KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.☆755Mar 9, 2026Updated 2 weeks ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago
- PoC memory injection detection agent based on ETW, for offensive and defensive research purposes☆300Apr 10, 2021Updated 4 years ago
- Process Monitor X v2☆652Jan 22, 2024Updated 2 years ago
- Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider☆198Dec 6, 2022Updated 3 years ago
- Document ETW providers☆277Mar 28, 2020Updated 5 years ago
- Run Processes as PPL with ELAM☆177Mar 17, 2022Updated 4 years ago
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆320Mar 20, 2024Updated 2 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆843Mar 11, 2021Updated 5 years ago
- Windows System Explorer☆878Nov 29, 2025Updated 3 months ago
- ETW Python Library☆293Aug 11, 2023Updated 2 years ago
- ☆511Aug 14, 2022Updated 3 years ago
- Dump the memory of a PPL with a userland exploit☆887Jul 24, 2022Updated 3 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,579Jan 5, 2021Updated 5 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆559Apr 8, 2025Updated 11 months ago
- Aims to identify sleeping beacons☆663Jan 25, 2026Updated 2 months ago
- Windows Object Explorer 64-bit☆1,900Updated this week
- Native API header files for the System Informer project.☆1,371May 25, 2025Updated 9 months ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- ☆209Apr 5, 2022Updated 3 years ago
- ☆1,793Aug 30, 2024Updated last year
- INF Studio for easier working with driver installation files☆39Nov 11, 2023Updated 2 years ago
- Security product hook detection☆327Mar 30, 2021Updated 4 years ago
- AV/EDR evasion via direct system calls.☆1,801Sep 3, 2022Updated 3 years ago
- ☆262May 9, 2024Updated last year
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- ☆620Jul 21, 2025Updated 8 months ago
- A collection of free miscellaneous Windows tools☆142Jul 22, 2025Updated 8 months ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆587Jan 24, 2023Updated 3 years ago
- ☆221Apr 2, 2018Updated 7 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆534Aug 1, 2022Updated 3 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆928Jul 20, 2024Updated last year
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,049Sep 24, 2023Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago