Example of hijacking system calls via function pointer tables
☆31Jun 26, 2021Updated 4 years ago
Alternatives and similar repositories for MySyscall
Users that are interested in MySyscall are comparing it to the libraries listed below
Sorting:
- ☆35Jun 13, 2020Updated 5 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆65Jun 19, 2019Updated 6 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- ☆24Mar 4, 2019Updated 7 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- Rootkit & Anti-rootkit☆42Jan 27, 2024Updated 2 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Simple x64dbg plugin to show registers on every step.☆16Jul 27, 2019Updated 6 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- handle elevation using bedaisy.☆13Aug 17, 2020Updated 5 years ago
- A simple process query/manipulation tool using driver hooked system call. (2019)☆12Aug 30, 2021Updated 4 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Mar 2, 2019Updated 7 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- DBKKernel used by Cheat Engine. Specially revised for VS2017 win10.☆34Jan 8, 2018Updated 8 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- Enumerate user mode shared memory mappings on Windows.☆128Feb 14, 2021Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- System call hook for Windows 10 20H1☆497Jun 26, 2021Updated 4 years ago
- createfile☆50Oct 27, 2015Updated 10 years ago