ntdll
Here are 18 public repositories matching this topic...
Inline syscalls made for MSVC supporting x64 and WOW64
-
Updated
Jul 10, 2023 - C++
Simple project that demonstrates how an ETW consumer can be created just by using NTDLL
-
Updated
Feb 23, 2019 - C++
Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.
-
Updated
Mar 22, 2025 - C++
manual mapping injector
-
Updated
Apr 16, 2022 - C++
Debugger checks in 3 ways
-
Updated
Jan 25, 2018 - C++
Using Undocumented NTDLL Functions to Read/Write/Delete File
-
Updated
Jan 25, 2021 - C++
Dynamic Syscall Dispatch & Execution Framework, Bypassing Usermode hooks & Kernel protections (Win10/11x64)
-
Updated
Apr 18, 2025 - C++
Single header library to simplify the usage of direct syscalls. x64/x86
-
Updated
Feb 26, 2023 - C++
Some stuff for dealing with Windows processes
-
Updated
Jun 24, 2017 - C++
Emergency Shutdown for Windows.
-
Updated
Mar 6, 2025 - C++
A demonstration of secure memory section creation and mapping using Windows native APIs, with integrity checks and safe memory modifications.
-
Updated
Sep 12, 2024 - C++
Unhooking NTDLL Without Reading It From Disk.
-
Updated
Apr 22, 2025 - C++
A Windows NT API hooking tool for intercepting and monitoring system calls
-
Updated
Feb 24, 2025 - C++
A Windows library for doing things you probably shouldn’t be doing with processes, tokens, and system calls.
-
Updated
Apr 17, 2025 - C++
Improve this page
Add a description, image, and links to the ntdll topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the ntdll topic, visit your repo's landing page and select "manage topics."