zodiacon / TotalPE2
PE Viewer
☆168Updated 2 months ago
Alternatives and similar repositories for TotalPE2:
Users that are interested in TotalPE2 are comparing it to the libraries listed below
- Explore Kernel Objects on Windows☆207Updated last year
- Single header version of System Informer's phnt library.☆203Updated this week
- Yet another PE Viewer☆139Updated 2 years ago
- A bunch of parsers for PE and PDB formats in C++☆236Updated 10 months ago
- Comparing, discussing, and bypassing various techniques for suspending and freezing processes on Windows.☆119Updated 3 years ago
- Advanced driver monitoring utility.☆207Updated 2 years ago
- Use ci.dll API for validating Authenticode signature of files☆138Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆274Updated 5 months ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆196Updated 2 years ago
- A global injection and hooking example☆135Updated last year
- An example of a client and server using Windows' ALPC functions to send and receive data.☆94Updated 2 months ago
- Authenticode Hash Calculator for PE32/PE32+ files☆109Updated last year
- Samples for the book Windows Kernel Programming, 2nd edition☆327Updated 3 months ago
- Debugger Anti-Detection Benchmark☆323Updated last year
- C++ library for low-level Windows development☆73Updated 11 months ago
- Enhanced version of the classic Spy++ tool☆188Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆167Updated 3 years ago
- Collection of undocumented Windows API declarations.☆305Updated this week
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆245Updated 2 months ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆134Updated 5 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆302Updated 2 years ago
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆233Updated this week
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆56Updated 3 years ago
- C++ Exceptions in Windows Drivers☆204Updated 4 years ago
- Debug Print viewer (user and kernel)☆65Updated last year
- View Windows System in action☆40Updated last week
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆203Updated 3 years ago
- Run Processes as PPL with ELAM☆157Updated 3 years ago