ZeroMemoryEx / TrampHook
Simple x86 Trampoline Hook
☆40Updated 2 years ago
Alternatives and similar repositories for TrampHook:
Users that are interested in TrampHook are comparing it to the libraries listed below
- Simple API Hooks detector☆73Updated 2 years ago
- Scan for potentially vulnerable drivers☆86Updated 3 years ago
- simple user-mode Rootkit☆103Updated 2 years ago
- Bypass Malware Time Delays☆101Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆12Updated 4 months ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆109Updated last year
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆108Updated last year
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆70Updated 2 years ago
- kernel to user mode APC injector☆44Updated 3 years ago
- spoof return address☆73Updated last year
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- using the gpu to hide your payload☆57Updated 2 years ago
- ☆108Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago
- Read Memory without ReadProcessMemory for Current Process☆76Updated 3 years ago
- simple shellcode injector☆115Updated 2 years ago
- Next gen process injection technique☆52Updated 4 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆84Updated 2 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆41Updated last year
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- ☆38Updated last year
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆46Updated 2 months ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆92Updated 3 years ago
- Kernel Mode Driver for Elevating Process Privileges☆133Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 10 months ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆26Updated 3 years ago
- Tool to find code cave in PE image (x86 / x64) - Find empty space to place code in PE files☆64Updated last year
- Process Hollowing demonstration & explanation☆35Updated 4 years ago