Flawww / WoW64Injection
Proof of concept for injecting a 64-bit DLL into a 32-bit application
☆30Updated 2 years ago
Alternatives and similar repositories for WoW64Injection:
Users that are interested in WoW64Injection are comparing it to the libraries listed below
- Debug Print viewer (user and kernel)☆66Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆44Updated 6 months ago
- Based on minhook☆30Updated last year
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- A bunch of architectural headers for i386 and AMD64☆36Updated last year
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆77Updated last month
- PoC kernel to usermode injection☆81Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆70Updated 3 years ago
- A poc that abuses Enclave☆38Updated 2 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆71Updated 5 years ago
- Simple and lightweight hypervisor for AMD processors☆29Updated 4 months ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- ☆69Updated 2 years ago
- Kernel ReClassEx☆61Updated last year
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆82Updated 4 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆67Updated last year
- ☆27Updated last year
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- PAGE_GUARD based hooking library☆43Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- ☆36Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆85Updated last year
- ☆46Updated 3 years ago
- Easy to include string and wstring obfuscation☆18Updated 3 years ago
- Native API header files for the Process Hacker project (nightly).☆26Updated last week
- Discarded Section Manual Map☆67Updated 4 years ago
- A debugger library using VEH.☆54Updated 7 months ago