A simple open source memory hooking library for Windows x86/x64
☆88Nov 16, 2020Updated 5 years ago
Alternatives and similar repositories for ColdHook
Users that are interested in ColdHook are comparing it to the libraries listed below
Sorting:
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- A simple open source module injector library x86/x64 for Windows☆22Jan 16, 2020Updated 6 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Aug 7, 2020Updated 5 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- XPause : Guaranteed to pause the debuggee☆17Oct 2, 2016Updated 9 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- A Steam offline emulator that allows you to play Steam games in SinglePlayer.☆332Jan 31, 2021Updated 5 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆58Sep 12, 2019Updated 6 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- A simple EasyAntiCheat x64 emulator.☆47Aug 18, 2019Updated 6 years ago
- The functions interception library written on pure C and NativeAPI with UserMode and KernelMode support☆764Apr 24, 2025Updated 10 months ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆10Jul 26, 2020Updated 5 years ago
- Reverse engineered source code of the autochk rootkit☆210Nov 1, 2019Updated 6 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- KDMAPPER build [1809,1903,1909,2004]☆73Sep 26, 2020Updated 5 years ago
- ☆111Nov 13, 2023Updated 2 years ago
- Converts IDA Pro signatures to C++ Detours☆13Jan 4, 2017Updated 9 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆106Sep 7, 2023Updated 2 years ago
- x86/x64 dll injector☆31May 17, 2022Updated 3 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 8 months ago
- ☆15Oct 7, 2020Updated 5 years ago
- Rendering on external windows via hijacking thread contexts☆406Jun 28, 2020Updated 5 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆353Sep 13, 2020Updated 5 years ago
- c++ implementation of windows heavens gate☆71Feb 12, 2021Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆65Aug 31, 2023Updated 2 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- Simple PE64 parser in Rust.☆13Jul 4, 2019Updated 6 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆180Jun 1, 2025Updated 9 months ago
- A wrapper class to hide the original calling address of a function☆55Aug 9, 2020Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆243Jul 7, 2021Updated 4 years ago