Cerbersec / HDE64
Hacker Disassembler Engine 64 Copyright (c) 2008-2009, Vyacheslav Patkov. * All rights reserved.
☆43Updated 2 years ago
Related projects: ⓘ
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆117Updated 3 years ago
- ☆62Updated 5 years ago
- ☆120Updated 4 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆90Updated last year
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆61Updated 3 weeks ago
- Force a file delete using a windows kernel driver☆58Updated 2 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆88Updated 4 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆132Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆120Updated 3 years ago
- Collect various versions of ntoskrnl files☆48Updated 8 months ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆50Updated 3 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆67Updated 4 years ago
- ☆124Updated last year
- D☆36Updated 3 years ago
- Different aproaches to detecting EPT hooks☆76Updated 2 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆81Updated last year
- Debug Print viewer (user and kernel)☆63Updated 7 months ago
- SlimDetours is an improved Windows API hooking library base on Microsoft Detours.☆34Updated last month
- query-pdb is a server-side software for parsing PDB files. The software provides PDB online parsing service.☆136Updated last week
- Resolve DOS MZ executable symbols at runtime☆93Updated 2 years ago
- Windows Driver Kit Extesion Header (Undoc)☆132Updated 2 years ago
- ☆43Updated last year
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆116Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆91Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆100Updated 2 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆50Updated 2 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆140Updated last year
- Ghetto user mode emulation of Windows kernel drivers.☆113Updated 2 years ago
- A modern, mod independent open source cheat for Enemy Territory☆62Updated 6 months ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆108Updated 2 years ago