A wrapper class to hide the original calling address of a function
☆56Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for Spoofed-Call
Users that are interested in Spoofed-Call are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A helper class for hardware breakpoints☆12Apr 25, 2020Updated 5 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- ☆36Jun 13, 2020Updated 5 years ago
- Simple handler for bypass battleye in 5 seconds☆10May 23, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 3 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 9 months ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆57May 23, 2022Updated 3 years ago
- Discarded Section Manual Map☆69Jun 18, 2020Updated 5 years ago
- neat way to detect memory read using nt layer function.☆13Aug 4, 2023Updated 2 years ago
- ☆36Jun 20, 2022Updated 3 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18Dec 4, 2020Updated 5 years ago
- Simulate SendInput with ClassService☆36Sep 5, 2018Updated 7 years ago
- PoC for a Vulnerability in OpenHardwareMonitor Driver that lets the user read and write in msrs☆22Sep 20, 2020Updated 5 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- Easy Anti PatchGuard☆221Apr 9, 2021Updated 5 years ago
- Pointer search for any classes using the RTTI feature.☆50Aug 30, 2020Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Nov 30, 2017Updated 8 years ago
- ☆193Dec 8, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆36Mar 19, 2019Updated 7 years ago
- Compileable POC of namazso's x64 return address spoofer.☆49Jun 10, 2020Updated 5 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- Hooking kernel functions by abusing alignment☆249Jan 5, 2021Updated 5 years ago
- Hide codes/data in the kernel address space.☆187May 8, 2021Updated 4 years ago
- Drawing from kernelmode without any hooks☆176Jul 7, 2022Updated 3 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆110Aug 3, 2023Updated 2 years ago
- A minimalistic way to spoof return addresses without using exceptions☆19Jul 26, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 4 years ago
- bypass CRC☆13May 3, 2018Updated 7 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 3 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆201Jul 11, 2023Updated 2 years ago
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Feb 17, 2023Updated 3 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- ShotHv☆154Mar 8, 2022Updated 4 years ago