VariantXYZ / ws_intercept
A simple hook into ws2_32.dll's send and receive functions that supports plugins to process/modify packets.
☆66Updated last year
Alternatives and similar repositories for ws_intercept:
Users that are interested in ws_intercept are comparing it to the libraries listed below
- Windows x64 PE process memory dumper to disk☆33Updated 5 months ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Basic example of how to change the initial rights on a memory region during runtime.☆43Updated last year
- Hiding x32/x64 Modules/DLLs using PEB☆62Updated 9 years ago
- OpenSSL hooking☆62Updated 10 years ago
- WS2_32 Proxy DLL Perfect for hooking any game you wish to log packets / inject packets etc..☆23Updated 5 years ago
- ☆55Updated 5 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆113Updated 7 years ago
- API to work with Win32 process memory and hardware breakpoints☆26Updated 5 years ago
- ☆46Updated 4 years ago
- HadesMem is a C++-based memory editing library for Windows based applications, with the goal of providing a safe, generic, powerful, and …☆26Updated 7 years ago
- Windows driver including couple different techniques for file removal when regular operation isn't possible.☆67Updated 9 years ago
- Windows kernel mode driver to prevent detection of debuggers.☆97Updated 9 years ago
- Small tool which loads Windows drivers with NtLoadDriver☆44Updated 3 years ago
- Global DLL injector☆66Updated 3 years ago
- Pointer search for any classes using the RTTI feature.☆48Updated 4 years ago
- A simple library which provides a way to read and write the memory of other processes☆51Updated 6 years ago
- windows kernel deriver loader(pro)☆46Updated 4 years ago
- APEX-EACBypass(usermode)☆46Updated 5 years ago
- BattlEye BEClient<->BEService usermode emulator☆81Updated 5 years ago
- ☆24Updated 6 years ago
- A plugin to x64dbg that lets you find out what writes to/accesses particular address☆92Updated 4 years ago
- Mono Framework Interaction / Injection Library for .NET (C++/CLI)☆70Updated 7 years ago
- External mid-function hooking method to retrieve register data☆86Updated 6 years ago
- Bypass User Account Control by manipulating tokens☆36Updated 7 years ago
- [NET5] Shows how to strip injected flags from calls to SendInput/MouseEvent☆47Updated 2 years ago
- hooking winsock send & recv in order to read all traffic of a process☆46Updated 6 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆55Updated 2 years ago
- KDMAPPER build [1809,1903,1909,2004]☆70Updated 4 years ago