搜索资源列表
ckaar.zip
- 使用ntdll.dll中未公布的函数实现的资源读写加锁的例子
NtdllProc(NtQuerySystemInformation)
- NT进程查看,使用NTDLL的NtQuerySystemInformation函数,vc6.0编译通过-NT process, NTDLL NtQuerySystemInformation use the function, vc6.0 compile
hookntcontinue
- ring0--hook NtContinue+source_code ring0下面hookNtContinue 使用drx7寄存器实现的hook this code hooks ntoskrnl!NtContinue to set dr7 to 0 (no updating of dr7) so NtContinue called from ring3 cannot alter drX registers... This hook will only PREVENT dr
parent
- 从所周知,NT环境中API的黑洞之一便是NTDLL.DLL,这个DLL包含了许多有用的函数,这些函数都是未公开的。此代码拟使用NTDLL.DLL中的NtQueryInformationProcess函数来获取任何指定进程之父进程的ID。-from known, NT environment API is one of the black hole NTDLL.DLL, the DLL contains many useful functions, these functions are not
ckaar.zip
- 使用ntdll.dll中未公布的函数实现的资源读写加锁的例子,An example of realising resource lock of reading and writing by using unpublished function in ntdll.d
LoadDriver
- 另类方法加载驱动,利用ntdll.dll导出函数ZwSetSystemInformation-Alternative method to load the driver, use ntdll.dll export function ZwSetSystemInformation
anti-ssdt
- Windows XP是通过sysenter调用KiFastCallEntry将ntdll.dll的调用切换到内核的。KiFastCallEntry的原理是通过在SSDT中查找函数地址跳转。所以只要伪造一张原始SSDT,就可以使得SSDT-HOOK无效了。-Windows XP by calling KiFastCallEntry sysenter ntdll.dll call will switch to the kernel. KiFastCallEntry SSDT principle i
CoolCPU
- CPU降温程序,用DDK+SDK开发的。加载驱动无须管理员权限,用DeviceIoControl与驱动交互。-CPU cooling procedures, with DDK SDK development. Drivers do not have administrator privileges to load and use DeviceIoControl interaction with the driver.
untNtCompress
- NtDll Compression using Windows APi, Compress Memory or file
GuiKmd
- GuiKmd - Driver Development in Delphi which is in GUI, not console.-GuiKmd- Driver Development in Delphi which is in GUI, not console.
WTM
- a simple demo program uses NATIVE APIs ( that is , from NTDLL.DLL, espicially NtQuerySystemInformation API) good to learn how to use NATIVE APIs this demo shows current memory usage, pageing status and freedisk space.
ntdll
- Last ntdll.lib with all definitions in one header.
inline_hooks_ntquerydirectoryfile
- Purpose: - Implement remote code injection - Usermode hook (Ntdll->NtQueryDirectoryFile) Note: This is only POC that will hide file explorer.exe Hidding file via usermode code injection to explorer.exe You can restart explorer.exe to un
ntdll
- 熟悉创建动态链接库,更好的使用MFC,学习COM编程- learn dynamic link library
NTDLL_Process
- 利用系统核心组件NTDLL来获取进程,这个是利用NTDLL的函数直接操作的-The system core components NTDLL of to get the process, this is a direct manipulation use NTDLL function
WinObj
- WinObj 是一个 32 位的 Windows NT 程序,它使用本机 Windows NT API(由 NTDLL.DLL 提供)来访问和显示有关 NT 对象管理器命名空间的信息。Winobj 似乎类似于 Microsoft SDK 的同名程序,但 SDK 版本存在许多重大的程序错误,这些错误会妨碍它显示准确的信息(例如,其句柄和引用计数信息被完全中断)。此外,我们的 WinObj 支持的对象类型更多。最后,2.0 版本的 WinObj 在用户界面方面有所增强,它知道如何打开设备对象,并允许
Azmrk-v3.1.1
- Azmrk是一款绿色软件,强大的Windows任务管理器,大多数函数声明在ntdll里。Naylon和ForDream贡献最大,我更新了一个版本,gam2046附加个小功能。功能不完善,望大家多多包涵。-Azmrk is a powerful Windows Task Manager by the Naylon and ForDream developers, I updated, gam2046 additional small function.
HDLL
- 在VB中,卸载NTDLL杀进程就是这种方法,但请慎重卸载其它DLL,先载入DLL并获取地址,然后Call函数地址,如果映像大小大于0,并且小于1.25G,估计没有那么大的DLL,这是只是为了判断数据是否合法,程序源码及方法仅供参考。以下为Assembly部分:Dim lngIndex As Long, lngCodeStart As Long 程序起始位址必须是16的倍数 VarPtr函数是用来取得变量的地址 lngCodeStart = VarPtr(m_O
HiddenDirectory
- 该文档介绍了用NT驱动程序来拦截NTAPI来实现彻底隐藏文件和目录的目的。NT下有一个文件NTDLL.DLL,大部分NTAPI都是在这个库中封装的。其中实现查找文件和目录的API接口是ZwQueryDirectoryFile,所以我们只要拦截这个API的话,文件和目录就可以完全隐藏了!-This document describes the use of NT driver to intercept NTAPI to achieve completely hidden files and dir
src4
- 利用调试寄存器机制利用ntdll.ntcontinue作为跳板-Mechanism for the use of debug registers to use as a springboard ntdll.ntcontinue
