armvirus / hook-scanner
Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.
☆71Updated 10 months ago
Related projects: ⓘ
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- ☆76Updated 3 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆81Updated 5 years ago
- i stole this from some guys private repo on github☆52Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆63Updated 3 years ago
- ☆53Updated this week
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆77Updated last year
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆100Updated last year
- ☆82Updated this week
- ☆46Updated 2 years ago
- game dumper☆39Updated 4 years ago
- Known ring3 memory protections that can be handled at a simple level.☆61Updated last year
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆48Updated 2 years ago
- This tool Decrypt and Extract the files from the EAC☆61Updated last year
- A proof of concept demonstrating communication via mapped shared memory structures between a user-mode process and a kernel-mode payload …☆73Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆75Updated last year
- ☆53Updated 4 years ago
- ☆33Updated 2 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆116Updated 2 years ago
- ☆46Updated last year
- mouseclassservicecallback detection via hook☆46Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆108Updated 2 years ago
- Helps to find patched modules☆26Updated 3 years ago
- Discarded Section Manual Map☆65Updated 4 years ago
- Kernel Lazy Importer☆107Updated 5 months ago
- scans through physical memory and paging tables in kernel mode☆104Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆69Updated last year
- Calling "own" MouseClassServiceCallback☆59Updated 2 years ago
- ☆40Updated 2 years ago
- ☆73Updated 2 years ago