ZeroMemoryEx / KasperskyHook
Hook system calls on Windows by using Kaspersky's hypervisor
☆11Updated last month
Alternatives and similar repositories for KasperskyHook:
Users that are interested in KasperskyHook are comparing it to the libraries listed below
- x86 Trampoline Hook☆40Updated 2 years ago
- Detect API Hooks☆73Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- A manual PE mapping implementation, aka reflective loader☆18Updated 2 years ago
- ☆29Updated 3 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 3 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- Bypassing kernel patch protection runtime☆19Updated 2 years ago
- ☆12Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 6 months ago
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- ☆27Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Enumerate Callbacks and all Object Types☆13Updated 2 years ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆16Updated last year
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆21Updated last year
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 2 years ago
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆12Updated 5 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆18Updated last week
- A VMWare logger using built-in backdoor.☆27Updated 4 months ago
- UEFI bootkit: Hardware Implant. In-Progress☆13Updated 2 years ago
- ☆14Updated last year