☆14Apr 7, 2018Updated 7 years ago
Alternatives and similar repositories for Kernel-Hijack
Users that are interested in Kernel-Hijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆120Mar 30, 2018Updated 7 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- just an lite AntiRootkit for interesting☆24Dec 9, 2015Updated 10 years ago
- Windows kernel-mode callbacks tutorial driver☆48Aug 8, 2016Updated 9 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Polymorphic Stub Creator☆34Jun 11, 2017Updated 8 years ago
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- Windows MITM proxy for proprietary miners☆14Nov 13, 2017Updated 8 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- ☆24Jul 24, 2020Updated 5 years ago
- hook detector☆31Nov 4, 2021Updated 4 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- Hijack a dll in a process to do something.☆14Aug 21, 2020Updated 5 years ago
- Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with…☆15Dec 23, 2020Updated 5 years ago
- Spoof Windows Test Signing Mode☆29Oct 13, 2018Updated 7 years ago
- One day in 2009 I decided to write a chess program. Just for fun - to see what can it do.☆12Apr 9, 2021Updated 4 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- Automatically exported from code.google.com/p/bypass-x64-dse☆21Oct 1, 2015Updated 10 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- Simple .Net hooking library☆31Jan 19, 2017Updated 9 years ago
- VCL-based UI components for system tools that use NtUtilsLibrary☆21Mar 4, 2026Updated 2 weeks ago
- Example to execute code in a remote process using wndproc trick☆16Apr 2, 2017Updated 8 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- ☆36Mar 22, 2017Updated 9 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago