Windows Resources

  • Windows Resources

Windows Resources Collection

This section lists only some common Windows tools for debugging, troubleshooting, and testing. Tools for packing/unpacking, encryption/decryption, file editors, and programming tools are omitted for brevity.

Tools

Monitoring & Analysis

Tool NameDownload LinkDescription
DebugViewhttps://docs.microsoft.com/zh-cn/sysinternals/downloads/debugviewA Sysinternals utility for capturing and controlling kernel and user-mode debug output.
Process Monitorhttps://docs.microsoft.com/zh-cn/sysinternals/downloads/procmonA real-time Sysinternals tool that monitors file system, registry, process, thread, and DLL activity to help troubleshoot issues.
Process Explorerhttps://docs.microsoft.com/zh-cn/sysinternals/downloads/process-explorerA Sysinternals process viewer that inspects loaded DLLs, call stacks, and which processes have opened a file.
WinObjhttps://docs.microsoft.com/zh-cn/sysinternals/downloads/winobjA Sysinternals viewer for the Object Manager namespace; it uses native APIs without loading drivers—see WinObjEx64 for an open-source implementation on GitHub.
WinObjEx64https://github.com/hfiref0x/WinObjEx64An open-source, advanced Object Manager namespace viewer.
Handlehttps://docs.microsoft.com/zh-cn/sysinternals/downloads/handleA Sysinternals utility showing which file or directory is held by a running process.
Sysinternals Suitehttps://live.sysinternals.com/The complete suite of Sysinternals utilities—only the most frequently used are listed here to avoid clutter.
CPU-Zhttps://www.cpuid.com/softwares/cpu-z.htmlReal-time CPU monitoring tool.
ProcMonXhttps://github.com/zodiacon/ProcMonXAn open-source C# implementation using ETW to provide functionality similar to Process Monitor.
ProcMonXv2https://github.com/zodiacon/ProcMonXv2The second open-source C# ETW-based alternative to Process Monitor.
Process Hackerhttps://github.com/processhacker/processhackerAn open-source Process Explorer-like tool with GPU information support.
API Monitorhttp://www.rohitab.com/apimonitorTraces API calls to show how applications/services interact, helps detect bugs, and can modify input/output parameters.
Dependency Walkerhttp://www.dependencywalker.com/Scans any 32- or 64-bit Windows module and lists all exported functions.
DeviceTreehttp://www.osronline.com/article.cfm%5earticle=97.htmDisplays all driver objects and device stack information in the system.
Unlockerhttps://www.softpedia.com/get/System/System-Miscellaneous/Unlocker.shtmlUnlocks files held by running processes—many similar open-source tools are available.
RpcViewhttps://github.com/silverf0x/RpcViewShows and decompiles live RPC interfaces on the system—useful when analyzing RPC services.
RequestTracehttps://the-sz.com/products/rt/Displays IRPs, SRBs, URBs, and related buffers on Windows; mostly redundant as WinDbg covers the same traces but handy without a debugger.
IRPMonhttps://github.com/MartinDrab/IRPMonHooks driver objects to monitor IRP traffic and other driver requests, similar to RequestTrace and IrpTracker.
IRPTracehttps://github.com/haidragon/drivertoolsContains a collection of additional tools.

AntiRootkit Tools

Tool NameDownload LinkDescription
PcHunterhttps://www.anxinsec.com/view/antirootkit/Security analysis tool that bypasses rootkits via direct disk, registry, network, etc., showing detailed info on threads, processes, and kernel modules.
Windows-Kernel-Explorerhttps://github.com/AxtMueller/Windows-Kernel-ExplorerClosed-source alternative to PcHunter, useful when newer OS support is missing.
PowerToolRarely updated. Developed by a colleague of a friend; reportedly messy codebase.
pyhttps://github.com/antiwar3/pyPiaoYun ARK—open-source rootkit scanner.

PE Tools

Tool NameDownload LinkDescription
CFF Explorerhttps://ntcore.com/?page_id=388A nice PE explorer.
ExeinfoPehttp://www.exeinfo.xn.pl/

Reverse & Debug

Tool NameDownload LinkDescription
Ghidrahttps://www.nsa.gov/resources/everyone/ghidra/A software reverse-engineering (SRE) suite created by the NSA Research Directorate to support cybersecurity missions.
IDAhttps://down.52pojie.cn/Famous but closed-source interactive disassembler—latest cracks (v7.5) on 52pojie forum.
dnSpyhttps://github.com/dnSpy/dnSpy.NET decompiler; effectively provides source code for unobfuscated .NET binaries if the framework is familiar to you.
OllyDbghttps://down.52pojie.cn/Tools/Debuggers//Popular debugger with many plugins; closed-source and only for 32-bit binaries.
x64dbghttps://x64dbg.com/Open-source debugger for x86/x64 binaries—more convenient than WinDbg yet similar plugin support; recommended over OllyDbg.
Cheat Enginehttps://www.cheatengine.org/Memory-search & manipulation Swiss-army knife; offers many advanced reverse-engineering features.
VirtualKD-Reduxhttps://github.com/4d61726b/VirtualKD-Redux/releasesFully-automated WinDbg virtual-machine debugging without env vars; supports latest VMware.
Driver Loaderhttp://www.osronline.com/article.cfm%5Earticle=157.htmOSR tool for installing, loading, and unloading drivers.
reverse-engineeringhttps://github.com/wtsxDev/reverse-engineeringA curated list of almost every tool you need for reverse engineering.

Injection Tools

Tool NameDownload LinkDescription
yapihttps://github.com/ez8-co/yapiSimple open-source DLL injector for x64/x86 processes—good for learning from the source; supports cross-bit-width injection from 32-bit to 64-bit.
Xenoshttps://github.com/DarthTon/XenosOpen-source injector using the famous Blackbone library; supports kernel-level injection.
ExtremeInjectorhttps://github.com/master131/ExtremeInjectorEasy-to-use application-layer injector featuring cross-bit-width injection from 32-bit to 64-bit.

Network

Tool NameDownload LinkDescription
Fiddlerhttps://www.telerik.com/fiddlerPowerful HTTPS man-in-the-middle proxy without a certificate hassle; scriptable; ships with an SDK.
Wiresharkhttps://www.wireshark.org/download.htmlNo introduction needed.
Burp Suitehttps://portswigger.net/burpThe go-to web proxy for pentesters. Requires JDK; cracked versions available on 52pojie.

Stress Testing Tools

Tool NameDownload LinkDescription
Driver Verifierhttps://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/driver-verifierBuilt-in driver stability and stress tester.
Application Verifierhttps://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/application-verifierBuilt-in application-layer stress tester.
CPUStresshttps://docs.microsoft.com/en-us/sysinternals/downloads/cpustresPushes CPU to full load to test application stability and responsiveness under extreme conditions.

Others

Tool NameDownload LinkDescription
game-hackinghttps://github.com/dsasmblr/game-hacking
awesome-malware-analysishttps://github.com/rootkiter/awesome-malware-analysisCurated list of malware-analysis tools
drawiohttps://github.com/jgraph/drawio-desktopThe ultimate diagramming tool
RazorSQLhttps://www.razorsql.com/GUI for SQLite3 databases
Git Learning Noteshttps://github.com/No-Github/1earn/blob/master/1earn/Develop/%E7%89%88%E6%9C%AC%E6%8E%A7%E5%88%B6/Git%E5%AD%A6%E4%B9%A0%E7%AC%94%E8%AE%B0.mdVersion management with Git
Markdown Syntax Learninghttps://github.com/No-Github/1earn/blob/master/1earn/Develop/%E6%A0%87%E8%AE%B0%E8%AF%AD%E8%A8%80/Markdown/Markdown%E8%AF%AD%E6%B3%95%E5%AD%A6%E4%B9%A0.mdMarkdown reference

Code

Operating System

Tool NameDownload LinkDescription
ReactOShttps://github.com/reactos/reactosAn open-source OS aiming for Windows 2000 driver binary compatibility.
wrk-v1.2https://github.com/jmcjmmcjc/wrk-v1.2Partial Windows NT 5.2 source code.
WinNT4https://github.com/ZoloZiak/WinNT4Windows NT4 kernel source code.
whidshttps://github.com/0xrawsec/whids/tree/a826d87e0d035daac10bfa96b530c5deff6b9915Open source EDR for Windows.

Kernel Examples

Tool NameDownload LinkDescription
CPPHelperhttps://github.com/Chuyu-Team/CPPHelperBasic C++ helper class library.
cpp_componenthttps://github.com/skyformat99/cpp_componentEncapsulation of common C/C++ features.
WinToolsLibhttps://github.com/deeonis-ru/WinToolsLibSuite of classes for Windows programming.
KDUhttps://github.com/hfiref0x/KDU
KTLhttps://github.com/MeeSong/KTL
Kernel-Bridgehttps://github.com/HoShiMin/Kernel-Bridge
KernelForgehttps://github.com/killvxk/KernelForge
ExecutiveCallbackObjectshttps://github.com/0xcpu/ExecutiveCallbackObjectsResearch on various kernel-mode callbacks.
SyscallHookhttps://github.com/AnzeLesnik/SyscallHookSystem-call hook for Windows 10 20H1.
Antivirus_R3_bypass_demohttps://github.com/huoji120/Antivirus_R3_bypass_demoEliminates AV via both R3 0-day and R0 0-day.
KernelHiddenExecutehttps://github.com/zouxianyu/KernelHiddenExecuteHide code/data in kernel address space.
DriverInjectDllhttps://github.com/strivexjun/DriverInjectDllKernel-mode global and memory-based injection for Win7–Win10.
zwhawkhttps://github.com/eLoopWoo/zwhawkKernel rootkit providing remote command/control.
ZeroBank-ring0-bundlehttps://github.com/Trietptm-on-Coding-Algorithms/ZeroBank-ring0-bundleKernel-mode rootkit for remote server communication.
kdmapperhttps://github.com/z175/kdmapperManual driver mapper (educational/outdated).
antispyhttps://github.com/mohuihui/antispyFree but powerful AV & rootkit detection toolkit.
windows_kernel_resourceshttps://github.com/sam-b/windows_kernel_resources
HookLibhttps://github.com/HoShiMin/HookLibUser- and kernel-mode hooking library.
Kernel-Whispererhttps://github.com/BrunoMCBraga/Kernel-WhispererKernel module utilities.
SQLiteCpphttps://github.com/SRombauts/SQLiteCppSmart, easy-to-use C++ SQLite3 wrapper.
awesome-windows-kernel-security-developmenthttps://github.com/ExpLife0011/awesome-windows-kernel-security-developmentCurated collection of Windows kernel security projects.

VT Technology

Tool NameDownload LinkDescription
hvpphttps://github.com/wbenny/hvpp
HyperBonehttps://github.com/DarthTon/HyperBone
HyperWinhttps://github.com/amiryeshurun/HyperWin
Hypervisorhttps://github.com/Bareflank/hypervisor
HyperPlatformhttps://github.com/tandasat/HyperPlatform
Hyper-V-Internalshttps://github.com/gerhart01/Hyper-V-Internals
Hypervisor-From-Scratchhttps://github.com/SinaKarvandi/Hypervisor-From-Scratch
KasperskyHookhttps://github.com/iPower/KasperskyHook
awesome-virtualizationhttps://github.com/Wenzel/awesome-virtualization
ransomware_begonehttps://github.com/ofercas/ransomware_begone

Miscellaneous

Tool NameDownload LinkDescription
Diverthttps://github.com/basil00/DivertRedirect network traffic to user-mode applications for modification/dropping.
Blackbonehttps://github.com/DarthTon/BlackboneKernel-mode injection techniques, including kernel memory injection.
NetWatchhttps://github.com/huoji120/NetWatchThreat-traffic detection platform; supports virtual memory patching.
x64_AOB_Searchhttps://github.com/wanttobeno/x64_AOB_SearchEnterprise-grade high-speed memory scanner (supports wildcards).
DuckMemoryScanhttps://github.com/huoji120/DuckMemoryScanDetects most so-called memory-only AV evasion shells.
FSDefenderhttps://github.com/Randomize163/FSDefenderFile-system monitoring combined with cloud-backed backups.
AntiRansomwarehttps://github.com/clavis0x/AntiRansomwareWrite-scanning anti-ransomware solution—prevents overwriting of files.
Lazyhttps://github.com/moonAgirl/Lazy(Malicious) ransomware terminator.
awesome-cheatsheetshttps://github.com/skywind3000/awesome-cheatsheets/blob/master/tools/git.txtHandy references for Python, Git, etc.

CTF Resources

Repository NameRepository LinkDescription
CTF-All-In-Onehttps://github.com/firmianay/CTF-All-In-One
ctf-bookhttps://github.com/firmianay/ctf-bookCompanion resources for the CTF Competition Guide (Pwn Edition).

Penetration Testing

Repository NameRepository LinkDescription
Web-Security-Learninghttps://github.com/CHYbeta/Web-Security-Learning
pentesthttps://github.com/r0eXpeR/pentestTools and project reference for pivoting inside intranets.
K8toolshttp://k8gege.org/p/72f1fea6.htmlCollection of K8tools.
Awesome-Red-Teaminghttps://github.com/yeyintminthuhtut/Awesome-Red-TeamingList of Awesome Red-Teaming Resources.
Awesome-Hackinghttps://github.com/Hack-with-Github/Awesome-HackingCurated lists for hackers.
awesome-web-hackinghttps://github.com/infoslack/awesome-web-hackingPenetration-testing knowledge base.
Repository NameRepository LinkDescription
Patent Information Service Platformhttp://search.cnipr.com/
patents<www.google.com/patents>
incopat<www.incopat.com>
Baitenhttps://www.baiten.cn/
rainpathttps://www.rainpat.com/
Duyanhttps://www.uyanip.com/