User-mode hook bypassing method
☆33Aug 26, 2016Updated 9 years ago
Alternatives and similar repositories for Toast
Users that are interested in Toast are comparing it to the libraries listed below
Sorting:
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- User-mode kernel callback framework☆10Nov 16, 2013Updated 12 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- XDK is a fully featured C++ wrapper library for Windows kernel development☆21Jan 20, 2016Updated 10 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Open Source Libraries Collection☆24Jan 1, 2016Updated 10 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- kernel space code☆12Jun 8, 2019Updated 6 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- ☆10Jan 9, 2017Updated 9 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- another socks5 server , support linux, BSD , use epoll and kqueue technology☆13Jan 16, 2018Updated 8 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- Detect the SCI in windows.☆11Mar 23, 2017Updated 8 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Oct 25, 2015Updated 10 years ago
- A sample on how to inject a DLL from a kernel driver☆61Sep 13, 2016Updated 9 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- ☆24Jul 24, 2020Updated 5 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Oct 27, 2017Updated 8 years ago
- MBR manipulation tool☆18Jan 13, 2014Updated 12 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Jan 15, 2014Updated 12 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 7 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆35Aug 31, 2018Updated 7 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago