The Wayback Machine - https://web.archive.org/web/20220606204309/https://github.com/topics/windows-kernel
Here are
39 public repositories
matching this topic...
Windows File System Proxy - FUSE for Windows
State-of-the-art native debugging tool
A modern tool for the Windows kernel exploration and tracing
Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.
Windows Storage Proxy Driver - User mode disk storage
Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.
kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x
Kernel mode WinDbg extension and PoCs for token privilege investigation.
C++ STL in the Windows Kernel with C++ Exception Support
SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.
A minimalistic educational hypervisor for Windows on AMD processors.
The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.
Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks
Updated
May 11, 2022
Python
A native hypervisor designed for the Windows operating system
Tools and PoCs for Windows syscall investigation.
Enumerate user mode shared memory mappings on Windows.
C# Utilities for Windows Notification Facility
Call arbitrary Windows kernel-mode functions from Python on another machine
Updated
Sep 17, 2021
Python
CSharp Writeups for HackSys Extreme Vulnerable Driver
Driver demonstrating how to register a DPC to asynchronously wait on an object
🔍 Code to read / write the Process Memory from the Kernel 🔧
Example Windows Kernel-mode Driver which enumerates running processes.
A POC for Windows Extension Host hooking
improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys
Very tiny and selective implementation of STL for Windows NT kernel mode drivers
A proof of concept demonstrating communication via mapped shared memory structures between a user-mode process and a kernel-mode payload on Windows 10 20H2.
A driver that supports communication between a Windows guest and HyperWin
Research on the client licensing service in the Windows kernel
WinPools is an example of how Windows kernel big pool addresses can be leaking using NtQuerySystemInformation
Improve this page
Add a description, image, and links to the
windows-kernel
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
windows-kernel
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.