MalwareTech / BasicHook
x86 Inline hooking engine (using trampolines)
☆96Updated 10 years ago
Alternatives and similar repositories for BasicHook:
Users that are interested in BasicHook are comparing it to the libraries listed below
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆427Updated 6 years ago
- Collection Of Anti-Debugging Tricks☆99Updated 9 years ago
- Name substitution plugin for IDA Pro☆145Updated 7 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆135Updated 7 years ago
- The CrowdDetox plugin for Hex-Rays automatically removes junk code and variables from Hex-Rays function decompilations.☆159Updated 3 years ago
- qb-sync is an open source tool to add some helpful glue between IDA Pro and Windbg. Its core feature is to dynamically synchronize IDA's …☆120Updated 9 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆72Updated 4 years ago
- Persistent IAT hooking application - based on bearparser☆251Updated 2 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆87Updated 7 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆359Updated 5 years ago
- PatchGuard Research☆295Updated 6 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Updated 2 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago
- Toolkit for enriching and speeding up static malware analysis☆166Updated 3 years ago
- The ultimate hooking library☆263Updated 3 years ago
- Python scripts for reverse engineering.☆182Updated 3 years ago
- Consonance, a dark color scheme for IDA.☆263Updated 12 years ago
- CaptainHook is perfect x86/x64 hook environment☆104Updated 8 years ago
- Hex-Rays Decompiler Enhanced View☆177Updated 6 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆216Updated 6 years ago
- Varoius IDC-scripts I've collected during the years.☆137Updated 10 years ago
- ☆243Updated 10 years ago
- A branch-monitor-based solution for process monitoring.☆132Updated 5 years ago
- IDA Sploiter is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's capabilities as an exploit development and vulnerab…☆187Updated 5 years ago
- my results for the exercises in the book "Practical Reverse Engineering" by Bruce Dang et al.☆109Updated 10 years ago
- Blackhat 2012 Sample Codes☆93Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆362Updated 7 years ago
- Proof of concept implementation of in-memory PE Loader based on ReflectiveDLLInjection Technique☆151Updated 6 years ago
- Detecting execution of kernel memory where is not backed by any image file☆256Updated 6 years ago
- ☆106Updated 2 years ago