FuckedUP - Best way to fuck up windows without UAC (.NET way) *BSOD
-
Updated
Jul 16, 2023 - C#
FuckedUP - Best way to fuck up windows without UAC (.NET way) *BSOD
Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.
This repository houses an extensive collection of .def files, which are header files containing enumerations of entry points for various native libraries. These entry points serve as essential references for developers seeking to interact with these libraries from their codebases.
Some stuff for dealing with Windows processes
A single header for undocumented windows function definitions
Terminator is a compact utility coded in C#, designed to end processes that have RtlSetProcessIsCritical enabled.
Dump syscall numbers from ntdll.dll
Proof of concept for injecting a 64-bit DLL into a 32-bit application
Find Windows syscall numbers from ntdll.dll
A shellcode runner / injector / hollower in Go, for windows
Single header library to simplify the usage of direct syscalls. x64/x86
Basic windows process protection written in Go, using the NtSetInformationProcess API
Collection of shellcode injection and execution techniques
Add a description, image, and links to the ntdll topic page so that developers can more easily learn about it.
To associate your repository with the ntdll topic, visit your repo's landing page and select "manage topics."