Extended Process Monitor-like tool based on Event Tracing for Windows
☆474Nov 29, 2019Updated 6 years ago
Alternatives and similar repositories for ProcMonX
Users that are interested in ProcMonX are comparing it to the libraries listed below
Sorting:
- Process Monitor X v2☆651Jan 22, 2024Updated 2 years ago
- Monitor activity of any driver☆352Nov 2, 2020Updated 5 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆748Jun 26, 2017Updated 8 years ago
- Windows Object Explorer 64-bit☆1,893Mar 9, 2026Updated last week
- WinDBG Anti-RootKit Extension☆646Jul 29, 2020Updated 5 years ago
- Simple driver to register all available process, thread, image, Registry, and Object callbacks☆124Oct 5, 2017Updated 8 years ago
- KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.☆755Mar 9, 2026Updated last week
- Windows System Explorer☆878Nov 29, 2025Updated 3 months ago
- Hook system calls, context switches, page faults and more.☆2,639May 9, 2023Updated 2 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆330May 2, 2024Updated last year
- Extract Windows Defender database from vdm files and unpack it☆476Feb 23, 2026Updated 3 weeks ago
- A free but powerful Windows kernel research tool.☆2,655Dec 14, 2025Updated 3 months ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆2,005Jul 13, 2022Updated 3 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Feb 23, 2019Updated 7 years ago
- Portable Executable Explorer☆161Mar 14, 2021Updated 5 years ago
- All reasonably stable tools☆1,402Feb 27, 2026Updated 3 weeks ago
- Research on Windows Kernel Executive Callback Objects☆316Feb 22, 2020Updated 6 years ago
- View ETW Provider manifest☆576Nov 1, 2024Updated last year
- Managed wrappers around the Windows API and some Native API☆35Jun 15, 2018Updated 7 years ago
- pseudo-code to show how to disable patchguard with win10☆295Jan 13, 2018Updated 8 years ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,049Sep 24, 2023Updated 2 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,362Jan 22, 2022Updated 4 years ago
- Source code for File Test - Interactive File System Test Tool☆305Aug 13, 2025Updated 7 months ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,038Apr 21, 2022Updated 3 years ago
- ☆826Jun 1, 2023Updated 2 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆332Mar 26, 2024Updated last year
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,802Nov 12, 2023Updated 2 years ago
- The Windows Kernel Programming book samples☆667Sep 25, 2023Updated 2 years ago
- ETW Python Library☆293Aug 11, 2023Updated 2 years ago
- ☆174Sep 9, 2020Updated 5 years ago
- C++ Exceptions in Windows Drivers☆222Dec 21, 2020Updated 5 years ago
- Contains the definitions for the Windows Internal UserMode API from ntdll.dll, samlib.dll and winsta.dll.☆432Aug 12, 2024Updated last year
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- Detours with just single dependency - NTDLL☆674Nov 25, 2025Updated 3 months ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,274May 1, 2024Updated last year
- windows syscall table from xp ~ 10 rs4☆356Jun 8, 2018Updated 7 years ago
- A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container☆1,379Dec 9, 2024Updated last year
- A PowerShell front-end for the Windows debugger engine.☆694Apr 3, 2024Updated last year
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,276Nov 6, 2025Updated 4 months ago