Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.
Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the OS.
The history of Windows Internals via symbols.
Enumerate user mode shared memory mappings on Windows.
Kernel Level NMI Callback Blocker
Windows kernel debugger for Linux hosts running Windows under KVM/QEMU
Collect various versions of ntoskrnl files
Analysis of the vulnerability
A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using InstrumentationCallback.
Kernel Mode DLL Manual Mapper
EPROCESS Unlinking example in "C" using DKOM Manipulation
Game Engine from an ADHDer that will never be finished.
PsLoadedModuleList Unlinking through DKOM Manipulation
All undocumented ntoskrnl structs crawled from vergiliusproject.com