VeroFess / X64SystemCall
All Nt Syscall and W32k Syscall in one asm, include, and call it!
☆57Updated 3 years ago
Alternatives and similar repositories for X64SystemCall:
Users that are interested in X64SystemCall are comparing it to the libraries listed below
- Hook NtDeviceIoControlFile with PatchGuard☆104Updated 2 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- https://githacks.org/Shawick/goodeye.git☆47Updated 4 years ago
- intel vt-x hypervisor ept☆25Updated 4 years ago
- ☆69Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆68Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- LSASS INJECTOR☆35Updated 6 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- VT Hook☆46Updated 8 months ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- Based on minhook☆31Updated last year
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆128Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated last year
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 3 years ago
- Using SetWindowHookEx for preinjected DLL's☆58Updated 2 years ago
- 不使用3环挂钩进行DWM桌面绘制☆79Updated 3 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated last year
- windows kernel pagehook☆38Updated 2 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- Another method to anti ThreadHideFromDebugger☆35Updated 6 years ago
- EtwHook for win7-win11;☆22Updated 2 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Only for Stress-Testing☆24Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 2 years ago