ZeroMemoryEx / KasperskyHook
Hook system calls on Windows by using Kaspersky's hypervisor
☆12Updated 4 months ago
Alternatives and similar repositories for KasperskyHook:
Users that are interested in KasperskyHook are comparing it to the libraries listed below
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Simple x86 Trampoline Hook☆40Updated 2 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆21Updated 10 months ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Simple API Hooks detector☆73Updated 2 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago
- ☆29Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆33Updated last year
- UEFI bootkit: Hardware Implant. In-Progress☆13Updated 3 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- Compileable POC of namazso's x64 return address spoofer.☆51Updated 4 years ago
- ☆59Updated 2 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- Register a callback from a Manually mapped kernel module☆16Updated 3 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆16Updated 3 years ago
- kernel to user mode APC injector☆44Updated 3 years ago
- hooks gServerHandlers xxxEventWndProc☆13Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 10 months ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 3 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- a driver to enumerate registered pnp callbacks for a particular interface class based on reversal of IoRegisterPlugPlayNotification☆11Updated last year
- ☆27Updated 2 years ago