A simple open source memory hooking library for Windows x86/x64
☆88Nov 16, 2020Updated 5 years ago
Alternatives and similar repositories for ColdHook
Users that are interested in ColdHook are comparing it to the libraries listed below
Sorting:
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- A simple open source module injector library x86/x64 for Windows☆22Jan 16, 2020Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- XPause : Guaranteed to pause the debuggee☆17Oct 2, 2016Updated 9 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- KDMAPPER build [1809,1903,1909,2004]☆73Sep 26, 2020Updated 5 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- Converts IDA Pro signatures to C++ Detours☆13Jan 4, 2017Updated 9 years ago
- ☆110Nov 13, 2023Updated 2 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆105Sep 7, 2023Updated 2 years ago
- The functions interception library written on pure C and NativeAPI with UserMode and KernelMode support☆762Apr 24, 2025Updated 10 months ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- ☆15Oct 7, 2020Updated 5 years ago
- Library for using direct system calls☆36Jan 30, 2025Updated last year
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Aug 7, 2020Updated 5 years ago
- web based GUI app to find offsets in various games.☆48Mar 6, 2023Updated 2 years ago
- reveal and detect of common hooks under win32☆13Sep 23, 2020Updated 5 years ago
- Simple PE64 parser in Rust.☆13Jul 4, 2019Updated 6 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- Reverse engineered source code of the autochk rootkit☆209Nov 1, 2019Updated 6 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆352Sep 13, 2020Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆65Aug 31, 2023Updated 2 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Dec 17, 2018Updated 7 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Clear the Visual Studio solution cache, free up your disk space!☆83Mar 16, 2021Updated 4 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Mar 8, 2020Updated 5 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- A wrapper class to hide the original calling address of a function☆55Aug 9, 2020Updated 5 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆31Jan 12, 2022Updated 4 years ago