zodiacon / ProcExpXLinks
☆67Updated 3 years ago
Alternatives and similar repositories for ProcExpX
Users that are interested in ProcExpX are comparing it to the libraries listed below
Sorting:
- BITS Transfers Manager☆44Updated 3 months ago
- INF Studio for easier working with driver installation files☆39Updated last year
- ☆55Updated 3 months ago
- C++ library for low-level Windows development☆79Updated last year
- Kernel Pool Monitor☆128Updated 3 years ago
- A driver to intercept low level windows events☆63Updated 5 years ago
- View handles and object for each object type☆64Updated 5 years ago
- Debug Print viewer (user and kernel)☆68Updated last year
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 5 years ago
- Send SECURE_ERASE_UNIT and SANITIZE_DEVICE ATA command to hard disks☆47Updated 11 years ago
- Static library and headers for linking your software with ntdll.dll☆33Updated 5 years ago
- Import library generator for x86 PE files☆58Updated 6 years ago
- ☆40Updated 3 months ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆49Updated 4 years ago
- Trace events in real time sessions☆45Updated last year
- Lightweight Portable Executable parsing library and a demo peParser application.☆81Updated 2 years ago
- A simple password-based PE encryptor for Windows 32-bit executables.☆52Updated 7 months ago
- Execute commands as local system.☆64Updated 6 years ago
- View Windows System in action☆42Updated 2 weeks ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆84Updated 11 months ago
- A sample on how to inject a DLL from a kernel driver☆62Updated 8 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆79Updated 6 years ago
- c++ implementation of windows heavens gate☆72Updated 4 years ago
- Plugin for Process Hacker 2 ( https://github.com/processhacker2 ), displays system hooks and able to unhook too.☆52Updated 7 years ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆21Updated last year
- NDC Oslo 2019 slides and demos☆32Updated 4 years ago
- DTrace for Windows in userspace; Frontend to ETW☆27Updated 2 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆52Updated 4 years ago
- A class to gather information about a process, its threads and modules.☆23Updated 5 years ago
- Example of real-time Windows ETW packet capture session☆53Updated 8 years ago