FiYHer / InfinityHookProLinks
InfinityHookPro Win7 -> Win11 latest
☆534Updated 2 years ago
Alternatives and similar repositories for InfinityHookPro
Users that are interested in InfinityHookPro are comparing it to the libraries listed below
Sorting:
- Windows Anti-Rootkit Tool☆506Updated 3 months ago
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆251Updated last year
- System call hook for Windows 10 20H1☆493Updated 4 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆544Updated 6 months ago
- Radical Windows ARK☆240Updated 2 months ago
- ☆283Updated 2 years ago
- a debugger use vt technology☆321Updated 3 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆248Updated 5 months ago
- Using Driver Global Injection dll, it can hide DLL modules☆525Updated 6 years ago
- Simple Intel VT-x hypervisor☆324Updated last year
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆472Updated 3 years ago
- Windows inline hooking tool.☆275Updated 6 years ago
- VMProtect 3.x Anti-debug Method Improved☆600Updated 6 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆418Updated 6 years ago
- Kernel Inject DLL☆345Updated 2 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆584Updated 6 months ago
- 轻量级VT框架和Ept无痕HOOK,测试环境:WIN10 1903,WIN7☆168Updated 2 years ago
- Lightweight Intel VT-x Hypervisor.☆573Updated 6 months ago
- ☆206Updated 2 years ago
- A library to manipulate physical memory from usermode.☆294Updated last year
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆603Updated 6 years ago
- Hide Driver By MiProcessLoaderEntry☆287Updated 6 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆439Updated 4 years ago
- 将shellcode注入dwm.exe以进行屏幕截取☆333Updated 3 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆333Updated 3 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆402Updated last year
- A kernel driver for reading and writing memory☆303Updated 2 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆189Updated 8 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆305Updated 5 years ago
- ☆519Updated 5 years ago