adamhlt / IAT-HookingLinks
IAT Hooking POC (x86 / x64) - Hook functions through the IAT
☆33Updated 10 months ago
Alternatives and similar repositories for IAT-Hooking
Users that are interested in IAT-Hooking are comparing it to the libraries listed below
Sorting:
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆47Updated 10 months ago
- ☆54Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆89Updated last year
- ☆79Updated 3 years ago
- ☆46Updated 3 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆56Updated 2 years ago
- InfinityHookProMax: Make InfinityHook great great again☆45Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆44Updated 11 months ago
- Hardware ID☆44Updated 3 years ago
- PoC kernel to usermode injection☆83Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- ☆68Updated 3 years ago
- Simple memory obfuscator.☆24Updated 2 years ago
- Driver hooks a function from NT windows. read/write memory and use windows GDI to draw on buffer from kernel.☆36Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated 2 years ago
- PAGE_GUARD based hooking library☆46Updated 2 years ago
- cr3 shuffle driver☆42Updated last year
- ☆50Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆53Updated 8 months ago
- Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.☆57Updated 5 years ago
- A library to assist with memory & code protection.☆56Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- ☆78Updated 3 years ago
- ☆47Updated 4 years ago
- Driver that communicates using a shared section☆57Updated 2 months ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆57Updated 4 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆76Updated last year
- Library containing Anti-RE and Anti-Debug methods.☆108Updated last month
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆53Updated 7 months ago