MoePus / wowHijack
Run some secret code invisible from debugger single step.(x86 process on x64 windows only)
☆24Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for wowHijack
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 3 years ago
- ☆32Updated 3 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆27Updated 7 years ago
- Yet another windows syscall library☆16Updated 4 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 4 years ago
- Bootkits☆19Updated last year
- Code Integrity Violation Spotter☆17Updated 5 months ago
- Yet another Windows DLL injector.☆38Updated 2 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Updated last year
- An API Monitor based on Instrumentation☆42Updated 6 years ago
- ☆12Updated 2 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- ☆12Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- ☆27Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆33Updated 4 months ago
- Extended library for using direct system calls on windows☆16Updated 2 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 4 years ago
- exploit termdd.sys(support kb4499175)☆57Updated 5 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- ☆44Updated 4 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆53Updated 4 years ago
- ☆22Updated 4 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago
- ☆13Updated last year
- This is a simple driver with x64 inline assembly☆52Updated 4 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆36Updated 2 years ago