FiYHer / InfinityHookProLinks
InfinityHookPro Win7 -> Win11 latest
☆541Updated 2 years ago
Alternatives and similar repositories for InfinityHookPro
Users that are interested in InfinityHookPro are comparing it to the libraries listed below
Sorting:
- Windows Anti-Rootkit Tool☆509Updated 4 months ago
- a debugger use vt technology☆324Updated 3 years ago
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆255Updated last year
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆548Updated 7 months ago
- Radical Windows ARK☆242Updated 3 months ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆251Updated 6 months ago
- ☆285Updated 2 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆525Updated 6 years ago
- System call hook for Windows 10 20H1☆496Updated 4 years ago
- VMProtect 3.x Anti-debug Method Improved☆607Updated 6 years ago
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆475Updated 3 years ago
- Kernel Inject DLL☆345Updated 2 years ago
- Windows inline hooking tool.☆281Updated 6 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆421Updated 6 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆589Updated 7 months ago
- Simple Intel VT-x hypervisor☆330Updated last year
- Hide Driver By MiProcessLoaderEntry☆288Updated 6 years ago
- ☆208Updated 2 years ago
- 轻量级VT框架和Ept无痕HOOK,测试环境:WIN10 1903,WIN7☆173Updated 2 years ago
- Lightweight Intel VT-x Hypervisor.☆587Updated 7 months ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆440Updated 4 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆308Updated 5 years ago
- Windows Kernel inject (no module no thread)☆277Updated 2 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆607Updated 6 years ago
- r/w virtual memory without attach☆188Updated last year
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆335Updated 3 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆403Updated last year
- Page fault hook use ept (Intel Virtualization Technology)☆192Updated 8 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆251Updated 3 years ago
- Kernel mode to user mode dll injection☆276Updated 4 years ago