Example of hijacking system calls via function pointer tables
☆31Jun 26, 2021Updated 4 years ago
Alternatives and similar repositories for MySyscall
Users that are interested in MySyscall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆35Jun 13, 2020Updated 5 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆58Sep 12, 2019Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 8 months ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆65Jun 19, 2019Updated 6 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- ☆24Mar 4, 2019Updated 7 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- Packet Injection With WFP☆16Feb 20, 2023Updated 3 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆346Apr 27, 2020Updated 5 years ago
- Rootkit & Anti-rootkit☆41Jan 27, 2024Updated 2 years ago
- System call hook for Windows 10 20H1☆495Jun 26, 2021Updated 4 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- ☆12Aug 28, 2017Updated 8 years ago
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- A simple open source memory hooking library for Windows x86/x64☆88Nov 16, 2020Updated 5 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- Enumerate user mode shared memory mappings on Windows.☆134Feb 14, 2021Updated 5 years ago
- createfile☆50Oct 27, 2015Updated 10 years ago
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Jan 2, 2021Updated 5 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆207May 27, 2021Updated 4 years ago
- ☆75Dec 17, 2019Updated 6 years ago
- Intel Virtualization Technology demo☆72Oct 15, 2016Updated 9 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- handle elevation using bedaisy.☆12Aug 17, 2020Updated 5 years ago
- Very tiny and selective implementation of STL for Windows NT kernel mode drivers☆18Jun 22, 2021Updated 4 years ago
- Hook discord's rendering functions without patching .text.☆14Nov 14, 2021Updated 4 years ago
- ☆99Oct 6, 2017Updated 8 years ago