byte2mov / codecave-hookLinks
codecave hook reverse engineering toolkit.
☆37Updated last year
Alternatives and similar repositories for codecave-hook
Users that are interested in codecave-hook are comparing it to the libraries listed below
Sorting:
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆44Updated 11 months ago
- ☆46Updated 7 months ago
- Fully working kernel-mode VAC bypass☆85Updated 6 months ago
- ☆60Updated 2 years ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆126Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆33Updated 11 months ago
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆49Updated last year
- Kernel<->Usermode shared memory communcation using manually mapped driver☆23Updated 3 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆22Updated last year
- a always updated and undetected temp spoof driver☆27Updated 5 months ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆161Updated 11 months ago
- Kernel Level NMI Callback Blocker☆119Updated last year
- A kernel injector for EAC and BE☆131Updated last year
- ☆80Updated last year
- PoC kernel to usermode injection☆87Updated last year
- This repository contains C++ code to load custom drivers by exploiting a vulnerable driver in Windows. This project demonstrates a techni…☆13Updated last month
- DSE & PG bypass via BYOVD attack☆62Updated 2 months ago
- manual map unsigned driver over signed memory☆201Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆60Updated 11 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆194Updated 7 months ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆64Updated 2 years ago
- PE Header (.rdata,.data,.text) obsfucation☆38Updated 3 years ago
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆96Updated last year
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆171Updated last year
- Undetected DLL Injection Method☆36Updated 2 years ago
- Tool to dump EFI runtime drivers.☆37Updated last year
- Fortnite External Leak Undetected EasyAntiCheat 2024 blabla black people☆44Updated last year
- An Unsigned Driver Mapper for Windows 10 22H2 -> Windows 11 23H2 that uses PdFwKrnl to exploit the Read/Write IOCTL Calls to disable DSE …☆12Updated last year
- Makes IDA (most versions) to crash upon opening it.☆101Updated last year