DeDf / HookSyscall64Links
☆36Updated 8 years ago
Alternatives and similar repositories for HookSyscall64
Users that are interested in HookSyscall64 are comparing it to the libraries listed below
Sorting:
- ☆27Updated 6 years ago
- An ark tool's driver☆40Updated 8 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- by others☆38Updated 7 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- Map memory to user space and manipulate user memory, using capmon☆23Updated 6 years ago
- enable libemu run pe file and add some good modify☆14Updated 6 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆28Updated 7 years ago
- map driver to memory☆26Updated 6 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆46Updated 8 years ago
- 大表哥的Syscall-Monitor☆34Updated 5 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 7 years ago
- Intel Virtualization Technology demo☆66Updated 8 years ago
- createfile☆48Updated 9 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- ☆23Updated 7 years ago
- Windows anti-rootkit library☆37Updated 10 years ago
- ☆40Updated 5 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆37Updated 10 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- ☆33Updated 4 years ago
- ☆26Updated 8 years ago
- Another method to anti ThreadHideFromDebugger☆36Updated 6 years ago
- a frame of amd-v svm nest☆53Updated 5 years ago
- ☆29Updated 8 years ago
- Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc☆16Updated 6 years ago
- ☆36Updated 9 years ago