Simple API Hooks detector
☆77Aug 22, 2022Updated 3 years ago
Alternatives and similar repositories for Hooks_Hunter
Users that are interested in Hooks_Hunter are comparing it to the libraries listed below
Sorting:
- simple user-mode Rootkit☆109Oct 24, 2022Updated 3 years ago
- Simple x86 Trampoline Hook☆44Aug 3, 2022Updated 3 years ago
- simple shellcode injector☆118Aug 4, 2022Updated 3 years ago
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- using the gpu to hide your payload☆64Aug 15, 2022Updated 3 years ago
- Security product hook detection☆327Mar 30, 2021Updated 4 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82May 23, 2023Updated 2 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆158Jul 22, 2021Updated 4 years ago
- Lifetime AMSI bypass☆671Sep 26, 2023Updated 2 years ago
- A simple program to obfuscate code written in cpp.☆51May 9, 2024Updated last year
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Now You See Me, Now You Don't☆1,028Jan 23, 2026Updated last month
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆222Jul 10, 2022Updated 3 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Aug 21, 2024Updated last year
- APT38 Tactic PoC for Stealing 0days from security researchers☆325May 30, 2025Updated 9 months ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆82Nov 5, 2023Updated 2 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- different ntdll unhooking techniques : unhooking ntdll from disk, from KnownDlls, from suspended process, from remote server (fileless)☆203Aug 2, 2023Updated 2 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- Anti-anti-debug: reset ThreadHideFromDebugger☆15Nov 25, 2021Updated 4 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red …☆350Jul 3, 2022Updated 3 years ago
- ☆42Apr 22, 2021Updated 4 years ago
- A Google Chrome Extension that adds logtime counter to the intra for the new 42Cursus☆12Mar 7, 2023Updated 3 years ago
- Windows Research Kernel☆37Sep 22, 2025Updated 5 months ago
- ☆17Oct 31, 2022Updated 3 years ago
- ☆40Nov 1, 2021Updated 4 years ago
- Hermes CI is an open-source continuous integration platform☆26Jan 17, 2022Updated 4 years ago
- Static library and headers for linking your software with ntdll.dll☆37Dec 16, 2019Updated 6 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago