zodiacon / ObjectExplorer
Explore Kernel Objects on Windows
☆209Updated last year
Alternatives and similar repositories for ObjectExplorer:
Users that are interested in ObjectExplorer are comparing it to the libraries listed below
- PE Viewer☆171Updated 2 months ago
- Yet another PE Viewer☆139Updated 2 years ago
- A global injection and hooking example☆135Updated last year
- Run any executable as SYSTEM account (no service required)☆127Updated 10 months ago
- Advanced driver monitoring utility.☆207Updated 2 years ago
- Use ci.dll API for validating Authenticode signature of files☆138Updated 3 years ago
- Collection of undocumented Windows API declarations.☆306Updated last week
- Single header version of System Informer's phnt library.☆205Updated last week
- An example of a client and server using Windows' ALPC functions to send and receive data.☆95Updated 2 months ago
- open source process monitor☆265Updated last year
- ☆126Updated 6 months ago
- A WinDbg extension to trace COM interactions☆114Updated last year
- A small tool that allows to run WinAPI functions through command line parameters☆185Updated 2 years ago
- Samples for the book Windows Kernel Programming, 2nd edition☆327Updated 3 months ago
- Code to make it easier to write an NDIS network driver on Windows☆85Updated last year
- Monitor Kernel pool allocations tags☆60Updated last year
- Comparing, discussing, and bypassing various techniques for suspending and freezing processes on Windows.☆119Updated 3 years ago
- Process Monitor X v2☆603Updated last year
- Authenticode Hash Calculator for PE32/PE32+ files☆109Updated last year
- A library to develop kernel level Windows payloads for post HVCI era☆395Updated 3 years ago
- This project aims to facilitate debugging a kernel driver in windows by adding support for a code change on the fly without reboot/unload…☆172Updated last year
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆274Updated 5 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆203Updated 3 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆139Updated 6 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆134Updated 5 years ago
- ☆159Updated 6 months ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆167Updated 3 years ago
- Research on Windows Kernel Executive Callback Objects☆286Updated 5 years ago
- A multiline (and ultimate) assembler (and disassembler) plugin for x64dbg and OllyDbg. A perfect tool for modifying and extending a compi…☆134Updated 2 months ago