FiYHer / InfinityHookProLinks
InfinityHookPro Win7 -> Win11 latest
☆544Updated 2 years ago
Alternatives and similar repositories for InfinityHookPro
Users that are interested in InfinityHookPro are comparing it to the libraries listed below
Sorting:
- Windows Anti-Rootkit Tool☆517Updated last month
- Using Driver Global Injection dll, it can hide DLL modules☆528Updated 6 years ago
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆285Updated last year
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆554Updated 9 months ago
- System call hook for Windows 10 20H1☆493Updated 4 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆261Updated 8 months ago
- ☆292Updated 2 years ago
- a debugger use vt technology☆332Updated 3 years ago
- Radical Windows ARK☆244Updated 5 months ago
- VMProtect 3.x Anti-debug Method Improved☆619Updated 6 years ago
- ☆215Updated 2 years ago
- Kernel Inject DLL☆345Updated 2 years ago
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆474Updated 4 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆419Updated 7 years ago
- Windows inline hooking tool.☆289Updated 7 years ago
- Simple Intel VT-x hypervisor☆336Updated last year
- Hide Driver By MiProcessLoaderEntry☆293Updated 6 years ago
- ☆540Updated 5 years ago
- This tiny project prevents the signtool from verifing cert time validity and let you sign your bin with outdated cert without changing sy…☆235Updated 6 years ago
- Lightweight Intel VT-x Hypervisor.☆619Updated 9 months ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆439Updated 4 years ago
- A kernel driver for reading and writing memory☆304Updated 2 years ago
- 轻量级VT框架和Ept无痕HOOK,测试环境:WIN10 1903,WIN7☆173Updated 2 years ago
- ☆159Updated 4 years ago
- Windows Kernel inject (no module no thread)☆279Updated 2 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆404Updated last year
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆358Updated 3 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆321Updated 5 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆598Updated 9 months ago
- r/w virtual memory without attach☆197Updated last year