alal4465 / HeavensGateHookLinks
Hooking Heavens Gate in a weekend
☆13Updated 3 years ago
Alternatives and similar repositories for HeavensGateHook
Users that are interested in HeavensGateHook are comparing it to the libraries listed below
Sorting:
- really ?☆12Updated last year
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Updated 3 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 2 years ago
- ☆25Updated 2 years ago
- ☆11Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated 11 months ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆12Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆28Updated last year
- ☆22Updated 2 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- ☆59Updated 3 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Updated 2 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆36Updated 10 years ago
- Dangling COM Keys Finder☆17Updated 3 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆34Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- ☆26Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆31Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 3 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- ☆16Updated 2 years ago