ZeroMemoryEx / KasperskyHook
Hook system calls on Windows by using Kaspersky's hypervisor
☆12Updated 2 months ago
Alternatives and similar repositories for KasperskyHook:
Users that are interested in KasperskyHook are comparing it to the libraries listed below
- x86 Trampoline Hook☆40Updated 2 years ago
- Register a callback from a Manually mapped kernel module☆15Updated 3 years ago
- Detect API Hooks☆73Updated 2 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆26Updated last year
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- hooks gServerHandlers xxxEventWndProc☆13Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆14Updated 3 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Compileable POC of namazso's x64 return address spoofer.☆51Updated 4 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆18Updated 2 years ago
- Written in a couple hours, don't judge :)☆14Updated last year
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆28Updated 3 years ago
- kernel to user mode APC injector☆44Updated 3 years ago
- RWX Section Abusing☆17Updated last year
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- Using SetWindowHookEx for preinjected DLL's☆59Updated 2 years ago
- ☆29Updated 3 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year
- (basic)AC external hack written in C++☆13Updated 3 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆17Updated 2 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 3 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆18Updated 9 months ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- windows rootkit☆58Updated 10 months ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 3 years ago
- ☆26Updated 3 years ago