FiYHer / InfinityHookProLinks
InfinityHookPro Win7 -> Win11 latest
☆545Updated 2 years ago
Alternatives and similar repositories for InfinityHookPro
Users that are interested in InfinityHookPro are comparing it to the libraries listed below
Sorting:
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆305Updated last year
- Windows Anti-Rootkit Tool☆528Updated 2 weeks ago
- Using Driver Global Injection dll, it can hide DLL modules☆532Updated 6 years ago
- a debugger use vt technology☆343Updated 3 years ago
- System call hook for Windows 10 20H1☆494Updated 4 years ago
- ☆294Updated 2 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆267Updated 9 months ago
- Radical Windows ARK☆244Updated 7 months ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆557Updated 10 months ago
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆475Updated 4 years ago
- VMProtect 3.x Anti-debug Method Improved☆632Updated 6 years ago
- Simple Intel VT-x hypervisor☆341Updated last year
- Hide Driver By MiProcessLoaderEntry☆292Updated 6 years ago
- ☆219Updated 2 years ago
- Kernel Inject DLL☆346Updated 2 years ago
- Windows inline hooking tool.☆292Updated 7 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆419Updated 7 years ago
- Lightweight Intel VT-x Hypervisor.☆632Updated 11 months ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆440Updated 5 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆333Updated 5 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆611Updated 10 months ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆364Updated 3 years ago
- A library to manipulate physical memory from usermode.☆296Updated 2 years ago
- r/w virtual memory without attach☆202Updated 2 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆621Updated 6 years ago
- 轻量级VT框架和Ept无痕HOOK,测试环境:WIN10 1903,WIN7☆174Updated 3 years ago
- ☆160Updated 5 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆194Updated 9 years ago
- ☆551Updated 5 years ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,029Updated 3 years ago