zodiacon / Win10SysProgBookSamplesLinks
Windows 10 System Programming book samples
☆431Updated last year
Alternatives and similar repositories for Win10SysProgBookSamples
Users that are interested in Win10SysProgBookSamples are comparing it to the libraries listed below
Sorting:
- The Windows Kernel Programming book samples☆634Updated last year
- Samples for the book Windows Kernel Programming, 2nd edition☆341Updated 6 months ago
- My personal cheat sheet for using WinDbg for kernel debugging☆424Updated 2 months ago
- Process Monitor X v2☆615Updated last year
- My notes while studying Windows internals☆431Updated 6 months ago
- Sample extensions, scripts, and API uses for WinDbg.☆769Updated 2 weeks ago
- C++ STL in the Windows Kernel with C++ Exception Support☆416Updated last year
- View ETW Provider manifest☆498Updated 7 months ago
- Native API header files for the System Informer project.☆1,199Updated last month
- PE-bear (builds only)☆779Updated 2 years ago
- awesome windbg extensions☆332Updated 6 years ago
- Windows System Explorer☆854Updated last year
- Windows NT x64 syscall fuzzer☆607Updated last year
- A wrapper library around native windows sytem APIs☆435Updated 4 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,237Updated last month
- Source code for File Test - Interactive File System Test Tool☆286Updated 2 months ago
- Useful scripts for WinDbg using the debugger data model☆414Updated last year
- PE Viewer☆182Updated 5 months ago
- All reasonably stable tools☆1,282Updated last month
- In-Memory PE Loader☆377Updated 5 years ago
- Collection of undocumented Windows API declarations.☆317Updated 2 weeks ago
- KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.☆675Updated 3 months ago
- Windows NT Syscall tables☆1,294Updated last week
- This is a collection of interesting codes about Windows Process creation.☆234Updated last year
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,232Updated last year
- Native API online documentation, based on the System Informer (formerly Process Hacker) phnt headers☆265Updated last week
- Run a Exe File (PE Module) in memory (like an Application Loader)☆903Updated 4 years ago
- Internals information about Hyper-V☆695Updated this week
- Detours with just single dependency - NTDLL☆645Updated 2 years ago
- Events from all manifest-based and mof-based ETW providers across Windows 10 versions☆299Updated last year