☆36Mar 27, 2022Updated 4 years ago
Alternatives and similar repositories for syscall-direct
Users that are interested in syscall-direct are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 4 years ago
- Spoofer for NtUserSendInput☆41Jan 12, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆173May 8, 2022Updated 4 years ago
- Small memory leak PoC that is happening in IopGetDeviceInterfaces☆25Oct 18, 2020Updated 5 years ago
- ☆223May 10, 2022Updated 4 years ago
- ☆63Jul 31, 2022Updated 3 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 4 months ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 5 years ago
- ☆19Apr 14, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple way to spoof return addresses using an exception handler☆45Aug 3, 2022Updated 3 years ago
- Drawing from kernelmode without any hooks☆176Jul 7, 2022Updated 3 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆103Mar 5, 2022Updated 4 years ago
- ☆24Aug 9, 2021Updated 4 years ago
- Disable threat tracing from the kernel..☆15Apr 8, 2022Updated 4 years ago
- ☆35Oct 10, 2023Updated 2 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- ☆143Jan 13, 2021Updated 5 years ago
- ☆43Oct 19, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆20Aug 13, 2023Updated 2 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Feb 12, 2023Updated 3 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆24Feb 9, 2024Updated 2 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- A simple MmCopyMemory hook.☆37Jul 11, 2022Updated 3 years ago
- UD overlay using SetWindowsHookEx☆17Apr 29, 2022Updated 4 years ago
- ☆47Mar 29, 2022Updated 4 years ago
- Calling "own" MouseClassServiceCallback☆77Jul 28, 2022Updated 3 years ago
- ☆17Apr 10, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆25May 17, 2022Updated 4 years ago
- POC Hook of nt!HvcallCodeVa☆55May 8, 2023Updated 3 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Aug 25, 2022Updated 3 years ago
- ☆37May 21, 2022Updated 4 years ago
- ☆65Aug 31, 2023Updated 2 years ago
- This tool Decrypt and Extract the files from the EAC☆93Feb 17, 2026Updated 3 months ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Oct 6, 2022Updated 3 years ago