Rat431 / ColdHook
A simple open source memory hooking library for Windows x86/x64
☆88Updated 4 years ago
Alternatives and similar repositories for ColdHook:
Users that are interested in ColdHook are comparing it to the libraries listed below
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆115Updated 8 years ago
- Global DLL injector☆67Updated 3 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆61Updated 4 years ago
- disable most common windowsx64 systems patchguard☆84Updated 6 years ago
- Pointer search for any classes using the RTTI feature.☆50Updated 4 years ago
- ☆66Updated 5 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆105Updated last year
- ☆49Updated 6 years ago
- A customizable process dumper.☆142Updated 5 years ago
- ☆97Updated 7 years ago
- Capcom driver exploit wrapper☆122Updated 5 years ago
- Intercepting DeviceControl via WPP☆133Updated 5 years ago
- Small tool which loads Windows drivers with NtLoadDriver☆44Updated 4 years ago
- BattlEye BEClient<->BEService usermode emulator☆83Updated 5 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- A simple kernel-level plugin for ReClass.NET☆36Updated 6 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated 2 years ago
- A simple EasyAntiCheat x64 emulator.☆47Updated 5 years ago
- ☆47Updated 3 years ago
- An x64dbg plugin that allows users to execute Cheat Engine auto assembler scripts within x64dbg.☆74Updated 7 years ago
- An open-source x86 / x86-64 hooking library for Windows.☆90Updated 7 months ago
- Lightweight and flexible library to load and communicate with kernel drivers on Windows.☆74Updated last year
- driver manual mapper☆28Updated 5 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- usermode standalone kernel interface☆110Updated 6 years ago
- Disable Driver Callbacks☆102Updated 7 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago