windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and utilities, range-based DLL and export enumeration, wrapper around KUSER_SHARED_DATA. supported compilers: clang, gcc and msvc
☆227Nov 2, 2025Updated 4 months ago
Alternatives and similar repositories for shadow_syscall
Users that are interested in shadow_syscall are comparing it to the libraries listed below
Sorting:
- Lazy Import technique implementation to call any import in the runtime☆28Jun 16, 2024Updated last year
- A cross-platform set of c++23 utilities☆38Oct 21, 2025Updated 5 months ago
- modern c++ wrapper around the microsoft portable executable file format☆35Nov 22, 2025Updated 3 months ago
- An x86-64 Code Virtualizer☆311Sep 26, 2024Updated last year
- ☆15Sep 26, 2021Updated 4 years ago
- C++ 20 Control Flow Obfuscation library for Windows Binaries☆437Oct 8, 2025Updated 5 months ago
- PE (and elf now!) bin2bin obfuscator☆831Oct 11, 2025Updated 5 months ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆554Nov 12, 2022Updated 3 years ago
- A Windows Direct Syscall Library☆53Apr 23, 2025Updated 10 months ago
- Fumo Loader - All in one kernel-based DLL injector☆372Jan 1, 2025Updated last year
- Anti-cheat library for Windows C++☆499Jul 22, 2022Updated 3 years ago
- ☆18Jan 11, 2026Updated 2 months ago
- Another ( there are few ) repository with FLIRT signatures☆29Aug 11, 2024Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- A modern C++20 header-only library for advanced direct system call invocation.☆169Jan 17, 2026Updated 2 months ago
- Manual mapping without creating any threads, with rw only access☆808Oct 29, 2019Updated 6 years ago
- PoC kernel to usermode injection☆106Feb 26, 2024Updated 2 years ago
- A simple present scene, kernel allocation injector.☆27Jun 12, 2022Updated 3 years ago
- obfuscated any constant encryption in compile time on any platform☆531Apr 25, 2023Updated 2 years ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆384Feb 26, 2025Updated last year
- PAGE_GUARD based hooking library☆52Jul 25, 2022Updated 3 years ago
- Lightweight HTTP C++ library / curl wrapper for web scrappers, session emulators, restful applications inspired by Laravel HTTP client / …☆18Jan 18, 2024Updated 2 years ago
- C++23 procedure hooking library.☆659Jan 28, 2026Updated last month
- Inline syscalls made easy for windows on clang☆736Jun 21, 2024Updated last year
- Obfusheader.h is a portable header file for C++14 compile-time obfuscation.☆982Aug 19, 2024Updated last year
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆382Mar 15, 2024Updated 2 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆389Aug 8, 2021Updated 4 years ago
- UltimateAnticheat is an open source usermode anti-cheat system made to detect and prevent common attack vectors in game cheating (C++, Wi…☆589Oct 29, 2025Updated 4 months ago
- Module extending manual mapper☆382Mar 28, 2020Updated 5 years ago
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆416Apr 19, 2025Updated 11 months ago
- Native code virtualizer for x64 binaries☆520Dec 20, 2024Updated last year
- x86-64 code/pe virtualizer☆209Dec 2, 2024Updated last year
- Leveraging Platform Trust Technology (PTT) to defeat Driver Signing Enforcement (DSE) to run Kernel Drivers (KMDF) with Secure Boot Enabl…☆14Aug 22, 2022Updated 3 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆204Feb 14, 2024Updated 2 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆202Jul 11, 2023Updated 2 years ago
- DLL scatter manual mapper☆813Apr 10, 2021Updated 4 years ago
- Compile-time, Usermode + Kernelmode, safe and lightweight string crypter library for C++11+☆820Jun 3, 2021Updated 4 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆393Jul 6, 2022Updated 3 years ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,903Aug 3, 2023Updated 2 years ago