Rat431 / ColdHook
A simple open source memory hooking library for Windows x86/x64
☆88Updated 4 years ago
Alternatives and similar repositories for ColdHook:
Users that are interested in ColdHook are comparing it to the libraries listed below
- A simple EasyAntiCheat x64 emulator.☆47Updated 5 years ago
- disable most common windowsx64 systems patchguard☆84Updated 6 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆59Updated 4 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- Global DLL injector☆66Updated 3 years ago
- Intercepting DeviceControl via WPP☆131Updated 5 years ago
- Pointer search for any classes using the RTTI feature.☆49Updated 4 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆104Updated last year
- ☆65Updated 5 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- An x64dbg plugin that allows users to execute Cheat Engine auto assembler scripts within x64dbg.☆73Updated 7 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆115Updated 8 years ago
- ☆48Updated 5 years ago
- Windows Kernel Driver dlls injector using APC☆61Updated 6 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆79Updated 4 years ago
- Hiding x32/x64 Modules/DLLs using PEB☆62Updated 9 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆68Updated 5 years ago
- An open-source x86 / x86-64 hooking library for Windows.☆90Updated 6 months ago
- Lightweight and flexible library to load and communicate with kernel drivers on Windows.☆75Updated 11 months ago
- Just my first IOCTL try☆72Updated 4 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆75Updated last year
- Enable SEH support for manual mapped x86-32bit PEs☆66Updated 6 years ago
- VAC3 (Valve Anti-Cheat 3) module emulator☆97Updated 4 years ago
- x64 syscall caller in C++.☆87Updated 6 years ago
- ☆41Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆34Updated 4 years ago
- Disable Driver Callbacks☆102Updated 7 years ago