Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
-
Updated
Dec 22, 2024 - C
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Reversing and reimplementing "powercfg /requests" using Native API
Dump syscall numbers from ntdll.dll
An example of native NT application
Demo programs using the Windows Native API
This is a C++ library that can be used to access different information about processes on the windows platform, it also provides you with the capability of executing 64-bit code in Wow64 processes.
Source code examples while me learning Windows System Programming
Clear the Windows Explorer icon cache as fast as possible.
Add a description, image, and links to the native-api topic page so that developers can more easily learn about it.
To associate your repository with the native-api topic, visit your repo's landing page and select "manage topics."