A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.
☆157Nov 14, 2021Updated 4 years ago
Alternatives and similar repositories for instrumentation_callbacks
Users that are interested in instrumentation_callbacks are comparing it to the libraries listed below
Sorting:
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆202Jul 11, 2023Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Oct 29, 2019Updated 6 years ago
- ☆158May 21, 2024Updated last year
- A simple way to spoof return addresses using an exception handler☆44Aug 3, 2022Updated 3 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆554Nov 12, 2022Updated 3 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- ☆193May 1, 2023Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- BattlEye shellcodes tester☆151Jan 3, 2022Updated 4 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆634Mar 19, 2019Updated 7 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- ☆225Mar 11, 2023Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆237Dec 21, 2021Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- 🪝 Various EPT hook detection approaches☆143Feb 22, 2026Updated 3 weeks ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Aug 28, 2021Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Code for Battleyes shellcode☆237Nov 11, 2021Updated 4 years ago
- ☆84Apr 1, 2022Updated 3 years ago
- base for testing☆187Sep 28, 2024Updated last year
- Emulate Drivers in RING3 with self context mapping or unicorn☆366Aug 18, 2022Updated 3 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 5 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- InfinityHookPro Win7 -> Win11 latest☆553Feb 7, 2023Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago