hooklib is a library that is used to inject DLL libraries in the processes, the interception code and the implementation of IPC.
☆22Nov 18, 2015Updated 10 years ago
Alternatives and similar repositories for hooklib
Users that are interested in hooklib are comparing it to the libraries listed below
Sorting:
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Example library for how to dynamically/statically hook/intercept unmanaged functions and APIs☆13Nov 9, 2022Updated 3 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Load and unload a DLL into an remote process without using WriteProcessMemory ;)☆16Jun 8, 2014Updated 11 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Sep 5, 2016Updated 9 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- A small HTTP server written in C++ using IO Completion Ports.☆24Sep 13, 2017Updated 8 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Oct 12, 2018Updated 7 years ago
- Yet another windows syscall library☆18Jun 22, 2020Updated 5 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- Spoof Windows Test Signing Mode☆29Oct 13, 2018Updated 7 years ago
- 常用代码类☆13May 31, 2014Updated 11 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Dynamic trace toolkit for Windows☆52Jun 25, 2025Updated 8 months ago
- Examples for detection of hidden processes on windows☆35Jun 11, 2014Updated 11 years ago
- NTrace -- a function boundary tracing tool for Windows user and kernel mode☆22Nov 1, 2013Updated 12 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- A gameclient hooking framework to aid debuging☆16Nov 27, 2019Updated 6 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Wow64 syscall hook☆43May 28, 2017Updated 8 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- MagicPoints plugin for x64dbg☆20Jan 19, 2018Updated 8 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- ☆19Jun 15, 2017Updated 8 years ago
- Hides a DLL and associated files based on a FILE_TAG as a user-mode injected DLL.☆21Oct 28, 2013Updated 12 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- 安全卫士项目☆32Aug 4, 2017Updated 8 years ago
- Remote thread injected DLL libraries, support for windows 32-bit and 64-bit platforms☆33Feb 6, 2015Updated 11 years ago