Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the OS.
-
Updated
Sep 21, 2024 - Rust
Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the OS.
Kernel Level NMI Callback Blocker
Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.
PsLoadedModuleList Unlinking through DKOM Manipulation
A mirror of Windows NT Kernel Documentation
Analysis of the vulnerability
A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using InstrumentationCallback.
All undocumented ntoskrnl structs crawled from vergiliusproject.com
The history of Windows Internals via symbols.
Enumerate user mode shared memory mappings on Windows.
Add a description, image, and links to the ntoskrnl topic page so that developers can more easily learn about it.
To associate your repository with the ntoskrnl topic, visit your repo's landing page and select "manage topics."