Shhoya / Shh0yaToolLinks
Analyze tool for windows reverser
☆31Updated 2 years ago
Alternatives and similar repositories for Shh0yaTool
Users that are interested in Shh0yaTool are comparing it to the libraries listed below
Sorting:
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆42Updated 3 years ago
- VMP Mutation API Fix☆44Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆71Updated 4 years ago
- ☆47Updated 3 years ago
- VT Hook☆49Updated last year
- A poc that abuses Enclave☆40Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆45Updated 3 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆70Updated 5 years ago
- Elevate arbitrary MSR writes to kernel execution.☆42Updated 2 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆71Updated 3 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆50Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- ☆69Updated 3 years ago
- Rootkit & Anti-rootkit☆41Updated last year
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 3 years ago
- windows kernel pagehook☆40Updated 3 years ago
- ☆42Updated 3 years ago
- A Windows Memory driver for game hacking purposes. Supports manual mapping with BlackBone and PastDSE.☆42Updated 4 years ago
- Hiding a system thread against conventional means of detection☆40Updated 5 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 4 years ago
- ☆25Updated 2 years ago
- x64 syscall caller in C++.☆93Updated 7 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32Updated 3 years ago
- Disk based DMA for ATA and SCSI☆37Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Updated 4 years ago
- ☆51Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago