buzzer-re / GanchoLinks
A tiny Windows hook library for x86/x64
☆14Updated 2 years ago
Alternatives and similar repositories for Gancho
Users that are interested in Gancho are comparing it to the libraries listed below
Sorting:
- Detour hooking IRQ1 ISR through IDT (Interrupt Descriptor Table)☆20Updated 2 years ago
- ☆10Updated 4 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- EWDK C++ toolchain for bazel☆10Updated 2 weeks ago
- A Windows API hooking library !☆31Updated 2 years ago
- Collection of IDA helpers☆16Updated 2 years ago
- ☆7Updated 3 months ago
- Windows DLL Injector☆12Updated 8 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- x64 Windows privilege elevation using anycall☆21Updated 4 years ago
- Learning Various Process Injection Techniques☆21Updated 6 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆10Updated 2 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Dump mapped PE files from memory to the disk☆20Updated 6 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- ☆35Updated 2 years ago
- Sometimes, you need to manipulate low-level functionality (C APIs, etc) from high-level languages (Python). Eg. Force the low-level calls…☆14Updated last year
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- Lightweight x86-64 disassembling library☆43Updated 2 years ago
- .lib file for linking against the NT CRT☆19Updated 3 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Pure-Python HashLink bytecode Swiss Army knife.☆16Updated last week
- A Linux x86/x86-64 tool to trace registers and memory regions.☆38Updated 3 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆20Updated 3 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Updated 2 years ago