Simple x86 Trampoline Hook
☆44Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for TrampHook
Users that are interested in TrampHook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- simple shellcode injector☆117Aug 4, 2022Updated 3 years ago
- Simple API Hooks detector☆77Aug 22, 2022Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆139Jan 3, 2023Updated 3 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆62Oct 27, 2021Updated 4 years ago
- Bypass Malware Time Delays☆105Sep 23, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 5 years ago
- simple user-mode Rootkit☆106Oct 24, 2022Updated 3 years ago
- simple C++ dll injector☆62Jan 13, 2022Updated 4 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 4 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83May 23, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- POC of a better implementation of GetProcAddress for ntdll using binary search☆112Apr 8, 2024Updated 2 years ago
- Bypassing kernel patch protection runtime☆22Feb 19, 2023Updated 3 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Lifetime AMSI bypass☆676Sep 26, 2023Updated 2 years ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆336May 30, 2025Updated 11 months ago
- ☆14Jun 29, 2023Updated 2 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- An automated tool to turn your ubuntu machine into a hacking lab☆31Feb 14, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- ☆17Apr 18, 2023Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Sep 3, 2022Updated 3 years ago
- A Simple Example☆24Nov 30, 2018Updated 7 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆16Jan 21, 2022Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Detect strange memory regions and DLLs☆191Jan 20, 2022Updated 4 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Aug 16, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago