A mini anti-anti debug hooking library for Windows.
☆106Jan 3, 2021Updated 5 years ago
Alternatives and similar repositories for ColdHide_V2
Users that are interested in ColdHide_V2 are comparing it to the libraries listed below
Sorting:
- A simple open source module injector library x86/x64 for Windows☆22Jan 16, 2020Updated 6 years ago
- A simple open source memory hooking library for Windows x86/x64☆88Nov 16, 2020Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- ☆110Nov 13, 2023Updated 2 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Millin Injector offers many features which can aid in creating usermode cheats. Its meant to be light weight and allow users to view thin…☆63Dec 4, 2021Updated 4 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Aug 7, 2020Updated 5 years ago
- Kernel mode bypass for BattlEye, EAC☆190Oct 25, 2023Updated 2 years ago
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆33Nov 3, 2019Updated 6 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- DLL scatter manual mapper☆811Apr 10, 2021Updated 4 years ago
- KDMAPPER build [1809,1903,1909,2004]☆73Sep 26, 2020Updated 5 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- A customizable process dumper.☆144Jul 5, 2019Updated 6 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- hook detector☆31Nov 4, 2021Updated 4 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆352Sep 13, 2020Updated 5 years ago
- Manual mapping without creating any threads, with rw only access☆805Oct 29, 2019Updated 6 years ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆379Mar 15, 2024Updated last year
- Rootkit & Anti-rootkit☆42Jan 27, 2024Updated 2 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆345Apr 27, 2020Updated 5 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆105Sep 7, 2023Updated 2 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- ☆125May 23, 2020Updated 5 years ago
- hwid-checker-mg is simple, proof-of-concept, hardware id checker made in C++ that utilizes the SMBIOS/DMI standards to output information…☆111Mar 25, 2022Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago