adamhlt / IAT-Hooking
IAT Hooking POC (x86 / x64) - Hook functions through the IAT
☆28Updated last month
Related projects: ⓘ
- ☆46Updated last year
- page table manipulation to gain physical r/w☆38Updated 4 months ago
- Bypass using kernel driver (not finish).☆20Updated last year
- Mapping your code on a 0x1000 size page☆66Updated 2 years ago
- ☆42Updated 3 years ago
- ☆43Updated 11 months ago
- mouseclassservicecallback detection via hook☆46Updated 2 years ago
- ☆62Updated this week
- ☆46Updated last year
- ☆50Updated this week
- A simple kernel driver for R/W Using kSockets with some bypass implementation overall I wouldn't say its "ud"☆28Updated 3 weeks ago
- ☆25Updated this week
- clearing traces of a loaded driver☆45Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆21Updated 3 years ago
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆47Updated 5 months ago
- ☆53Updated this week
- Top level overlay drawing for game cheating using dwm.exe☆42Updated 2 years ago
- PAGE_GUARD based hooking library☆38Updated 2 years ago
- ☆41Updated this week
- Simulate SendInput with ClassService☆30Updated 6 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆75Updated last year
- ☆17Updated this week
- Fully UD On EAC Now Enjoy Pasters :)☆16Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆63Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 5 years ago
- ☆48Updated 9 months ago
- Hiding a system thread against conventional means of detection☆34Updated 3 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆47Updated 2 years ago
- Simple memory obfuscator.☆23Updated 2 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆18Updated last year