Windows inline hooking tool.
☆297Oct 7, 2018Updated 7 years ago
Alternatives and similar repositories for kernelhook
Users that are interested in kernelhook are comparing it to the libraries listed below
Sorting:
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆561Jan 4, 2025Updated last year
- System call hook for Windows 10 20H1☆496Jun 26, 2021Updated 4 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆344Apr 27, 2020Updated 5 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆386Jul 6, 2022Updated 3 years ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆624Feb 22, 2019Updated 7 years ago
- ☆110Nov 13, 2023Updated 2 years ago
- C++ graphics kernel subsystem hook☆561Jan 11, 2021Updated 5 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Simple Kernelmode DLL Injector with Manual mapping☆338Nov 29, 2023Updated 2 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆382Aug 8, 2021Updated 4 years ago
- Kernel Inject DLL☆352Mar 21, 2023Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆324Apr 26, 2022Updated 3 years ago
- Manual mapping without creating any threads, with rw only access☆805Oct 29, 2019Updated 6 years ago
- base for testing☆186Sep 28, 2024Updated last year
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆385Jan 29, 2022Updated 4 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆203Feb 14, 2024Updated 2 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Mar 8, 2020Updated 5 years ago
- DLL scatter manual mapper☆811Apr 10, 2021Updated 4 years ago
- ☆148Jan 24, 2024Updated 2 years ago
- Kernel Level NMI Callback Blocker☆164Sep 27, 2025Updated 5 months ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆902Nov 21, 2019Updated 6 years ago
- ☆144Dec 10, 2022Updated 3 years ago
- manually map driver for a signed driver memory space☆174Mar 11, 2021Updated 4 years ago
- Access without a real handle☆1,035Apr 10, 2021Updated 4 years ago
- Kernel LdrLoadDll injector☆264Oct 6, 2018Updated 7 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆470Jan 3, 2022Updated 4 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆421Sep 9, 2018Updated 7 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆243Jul 7, 2021Updated 4 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,270May 1, 2024Updated last year
- Using Driver Global Injection dll, it can hide DLL modules☆536Jun 28, 2019Updated 6 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆464Feb 18, 2021Updated 5 years ago
- PoC EFI runtime driver for memory r/w & kdmapper fork☆569Nov 30, 2024Updated last year