adamhlt / IAT-HookingLinks
IAT Hooking POC (x86 / x64) - Hook functions through the IAT
☆33Updated last year
Alternatives and similar repositories for IAT-Hooking
Users that are interested in IAT-Hooking are comparing it to the libraries listed below
Sorting:
- ☆68Updated 4 years ago
- ☆82Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆72Updated 4 years ago
- InfinityHookProMax: Make InfinityHook great great again☆46Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆96Updated 2 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 3 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆57Updated 3 years ago
- ☆51Updated last year
- ☆70Updated 3 years ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆60Updated last year
- Protect a process from code injection, termination and hooking☆50Updated 4 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
- Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.☆59Updated 6 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆90Updated 6 years ago
- Top level overlay drawing for game cheating using dwm.exe☆44Updated 3 years ago
- cr3 shuffle driver☆61Updated last year
- PAGE_GUARD based hooking library☆48Updated 3 years ago
- driver that communicates using a shared section☆72Updated 6 months ago
- Obfuscate calls to imports by patching in stubs☆72Updated 4 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- Simple memory obfuscator.☆24Updated 3 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Updated 3 years ago
- Based on minhook☆34Updated 2 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆93Updated 5 years ago
- ☆57Updated 2 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Updated 2 years ago
- Library containing Anti-RE and Anti-Debug methods.☆115Updated 4 months ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆84Updated 2 years ago
- page table manipulation to gain physical r/w☆44Updated last year