A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.
☆160Nov 14, 2021Updated 4 years ago
Alternatives and similar repositories for instrumentation_callbacks
Users that are interested in instrumentation_callbacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆120May 25, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆200Jul 11, 2023Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Oct 29, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆158May 21, 2024Updated last year
- A simple way to spoof return addresses using an exception handler☆45Aug 3, 2022Updated 3 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆562Nov 12, 2022Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- ☆194May 1, 2023Updated 2 years ago
- BattlEye shellcodes tester☆153Jan 3, 2022Updated 4 years ago
- Walks through the 4-level paging structures in Windows x64☆14Feb 12, 2023Updated 3 years ago
- mouseclassservicecallback detection via hook☆54Feb 7, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆632Mar 19, 2019Updated 7 years ago
- ☆193Dec 8, 2021Updated 4 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆148Feb 12, 2022Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆120Feb 8, 2022Updated 4 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆173May 8, 2022Updated 3 years ago
- ☆225Mar 11, 2023Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆240Dec 21, 2021Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆74Aug 31, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🪝 Various EPT hook detection approaches☆146Feb 22, 2026Updated 2 months ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆221Nov 12, 2020Updated 5 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Aug 28, 2021Updated 4 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆201Jan 13, 2022Updated 4 years ago
- Code for Battleyes shellcode☆236Nov 11, 2021Updated 4 years ago
- ☆84Apr 1, 2022Updated 4 years ago
- base for testing☆189Sep 28, 2024Updated last year
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 5 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- InfinityHookPro Win7 -> Win11 latest☆554Feb 7, 2023Updated 3 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 4 years ago
- Finding Truth in the Shadows☆127Jan 26, 2023Updated 3 years ago
- The Grimoire Hypervisor solution for x86 Processors with experimental nested virtualization support. Remastering with Rust in progress.☆628Updated this week