Cerbersec / HDE64Links
Hacker Disassembler Engine 64 Copyright (c) 2008-2009, Vyacheslav Patkov. * All rights reserved.
☆50Updated 3 years ago
Alternatives and similar repositories for HDE64
Users that are interested in HDE64 are comparing it to the libraries listed below
Sorting:
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆164Updated this week
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆136Updated 3 years ago
- ☆134Updated 2 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆94Updated 2 years ago
- ☆125Updated 5 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆58Updated 4 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆71Updated 5 years ago
- query-pdb is a server-side software for parsing PDB files. The software provides PDB online parsing service.☆154Updated 8 months ago
- ☆166Updated 3 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆143Updated last year
- ☆48Updated 2 years ago
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆82Updated last week
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- ☆52Updated 2 years ago
- Collect various versions of ntoskrnl files☆53Updated last year
- ☆65Updated 6 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆108Updated 2 years ago
- ShotHv☆143Updated 3 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆95Updated last week
- An example of a client and server using Windows' ALPC functions to send and receive data.☆96Updated 4 months ago
- ☆204Updated 2 years ago
- 🪝 Different aproaches to detecting EPT hooks☆109Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- 滥用cow机制进行全局注入☆97Updated 4 years ago
- ☆179Updated 2 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- x64 syscall caller in C++.☆90Updated 6 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 3 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆131Updated 3 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago