Stars
Dear ImGui: Bloat-free Graphical User interface for C++ with minimal dependencies
Flexible frontend for managing and deploying language models.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Virtual Multiple HID Driver (multitouch, mouse, digitizer, keyboard, joystick)
A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList however requires a PG Bypass on (Some) Machines > 22H2 Win10, No…
Official repository for all SharpDX Samples
#1 Locally hosted web application that allows you to perform various operations on PDF files
Effortless data labeling with AI support from Segment Anything and other awesome models.
PoC for Bypassing DACL in Windows with DuplicateHandle
Kernel physical memory Read/Write no attach, Dual Hook communication, clears all traces, no system threads, no usermode threads, usermode universal hijack.
A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.
Enumerate which window API calls are hooked by an EDR using inline patching technique
Inline syscalls made for MSVC supporting x64 and WOW64
The Next Generation of Anti-Rookit(ARK) tool for Windows.
WinRing0 is a hardware access library for Windows.
A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.
Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.
d3d12 hook with imgui, directx12 hook, dx12 hook, d3d12 api hook
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Simple ETW unhook PoC. Overwrites NtTraceEvent opcode to disable ETW at Nt-function level.
A list of all the DLLs export in C:\windows\system32\