Ilyatk / HookEngineLinks
☆33Updated 3 years ago
Alternatives and similar repositories for HookEngine
Users that are interested in HookEngine are comparing it to the libraries listed below
Sorting:
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Updated 10 years ago
- windows kernel File redirection☆20Updated 11 years ago
- The dll that can hide itself and then delete itselft.☆32Updated 12 years ago
- easy detour-, vftable-, iat- and eathooking☆12Updated 9 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Updated 11 years ago
- Wow64 syscall hook☆42Updated 8 years ago
- ☆15Updated 10 years ago
- windows create process with a dll load first time via LdrHook☆31Updated 9 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 10 years ago
- Examples for detection of hidden processes on windows☆35Updated 11 years ago
- network speed limiter for Windows☆17Updated 9 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 7 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- library, which help to describe or load and execute PE files.☆55Updated 12 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Updated 12 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆24Updated 10 years ago
- A command line tool to load and unload a device driver.☆46Updated 8 years ago
- a network filter using NDIS hook technique☆19Updated 12 years ago
- ☆24Updated 5 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆36Updated 11 years ago
- Dynamic trace toolkit for Windows☆52Updated 7 months ago
- ☆14Updated 7 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Updated 11 years ago
- ☆24Updated 8 years ago
- A c++, QT gui based memory engine☆13Updated 7 years ago
- PE Infector/Cryptor source code☆16Updated 8 years ago
- WIP - Play with Intel VM Extensions☆23Updated 8 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Updated 10 years ago
- User-mode kernel callback framework☆10Updated 12 years ago