Simple x86 Trampoline Hook
☆44Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for TrampHook
Users that are interested in TrampHook are comparing it to the libraries listed below
Sorting:
- simple shellcode injector☆118Aug 4, 2022Updated 3 years ago
- Simple API Hooks detector☆77Aug 22, 2022Updated 3 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Jan 3, 2023Updated 3 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆61Oct 27, 2021Updated 4 years ago
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 4 years ago
- simple user-mode Rootkit☆109Oct 24, 2022Updated 3 years ago
- simple C++ dll injector☆61Jan 13, 2022Updated 4 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆111Apr 8, 2024Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82May 23, 2023Updated 2 years ago
- Bypassing kernel patch protection runtime☆22Feb 19, 2023Updated 3 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- Lifetime AMSI bypass☆671Sep 26, 2023Updated 2 years ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆325May 30, 2025Updated 9 months ago
- ☆14Jun 29, 2023Updated 2 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- An automated tool to turn your ubuntu machine into a hacking lab☆31Feb 14, 2022Updated 4 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- A Simple Example☆23Nov 30, 2018Updated 7 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆18Jan 21, 2022Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Detect strange memory regions and DLLs☆190Jan 20, 2022Updated 4 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Aug 16, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago