☆36Mar 27, 2022Updated 3 years ago
Alternatives and similar repositories for syscall-direct
Users that are interested in syscall-direct are comparing it to the libraries listed below
Sorting:
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- ☆224May 10, 2022Updated 3 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- ☆16Apr 10, 2025Updated 10 months ago
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- ☆35Oct 10, 2023Updated 2 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 3 years ago
- ☆63Jul 31, 2022Updated 3 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- ☆18Feb 5, 2025Updated last year
- ☆43Oct 19, 2021Updated 4 years ago
- ☆19Apr 14, 2023Updated 2 years ago
- ☆20Aug 13, 2023Updated 2 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- ☆146Jan 13, 2021Updated 5 years ago
- ☆37May 21, 2022Updated 3 years ago
- A simple way to spoof return addresses using an exception handler☆43Aug 3, 2022Updated 3 years ago
- ☆48Mar 29, 2022Updated 3 years ago
- Calling "own" MouseClassServiceCallback☆76Jul 28, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- Drawing from kernelmode without any hooks☆174Jul 7, 2022Updated 3 years ago
- Small memory leak PoC that is happening in IopGetDeviceInterfaces☆25Oct 18, 2020Updated 5 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆22Feb 9, 2024Updated 2 years ago
- Spoofer for NtUserSendInput☆40Jan 12, 2022Updated 4 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Apr 17, 2021Updated 4 years ago
- This tool Decrypt and Extract the files from the EAC☆86Feb 17, 2026Updated last week
- A simple MmCopyMemory hook.☆38Jul 11, 2022Updated 3 years ago
- ☆24May 17, 2022Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Feb 17, 2023Updated 3 years ago