Cerbersec / HDE64Links
Hacker Disassembler Engine 64 Copyright (c) 2008-2009, Vyacheslav Patkov. * All rights reserved.
☆51Updated 3 years ago
Alternatives and similar repositories for HDE64
Users that are interested in HDE64 are comparing it to the libraries listed below
Sorting:
- ☆65Updated 6 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆58Updated 4 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆95Updated 2 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆100Updated 6 months ago
- ☆125Updated 5 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆136Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆111Updated 2 years ago
- Analyze Windows x64 Kernel Memory Layout☆122Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆109Updated 3 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆145Updated last year
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆173Updated 2 months ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆141Updated 4 years ago
- 滥用cow机制进行全局注入☆98Updated 4 years ago
- ☆49Updated 2 years ago
- 之前学习X64VT写的代码, 很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆69Updated 4 years ago
- a monitoring windows driver calls kernel api tools☆112Updated last year
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Updated last year
- Collect different versions of Crucial modules.☆143Updated last year
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆71Updated 5 years ago
- c++ implementation of windows heavens gate☆72Updated 4 years ago
- Force a file delete using a windows kernel driver☆67Updated 3 years ago
- ☆140Updated 2 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆88Updated 2 months ago
- 🪝 Different approaches for EPT hook detection☆115Updated last week
- Obfuscate calls to imports by patching in stubs☆69Updated 4 years ago
- Protect a process from code injection, termination and hooking☆49Updated 4 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆127Updated 2 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆107Updated 6 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago