direct systemcalls with a modern c++20 interface.
☆45Jan 6, 2023Updated 3 years ago
Alternatives and similar repositories for SneakCalls
Users that are interested in SneakCalls are comparing it to the libraries listed below
Sorting:
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- ☆39Oct 29, 2020Updated 5 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆100Jun 21, 2020Updated 5 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- A set of Windows 10+/VS2022/C++14 tools for working with software modifications in two files (Detours.h, Detours.cpp).☆46Feb 1, 2026Updated last month
- x64 assembler library☆31Jun 7, 2024Updated last year
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- What makes it page☆17Aug 24, 2022Updated 3 years ago
- Very tiny and selective implementation of STL for Windows NT kernel mode drivers☆18Jun 22, 2021Updated 4 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- x64 Kernel Hooks Detection☆24Jan 1, 2017Updated 9 years ago
- External cheat base with DirectX overlay☆20Jul 25, 2018Updated 7 years ago
- Using C++ STL on Windows kernle development☆91Feb 21, 2019Updated 7 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- ☆145Dec 10, 2022Updated 3 years ago
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告)☆15Mar 5, 2019Updated 7 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71May 11, 2022Updated 3 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Jul 6, 2018Updated 7 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Injector with kernel power☆18Jan 2, 2021Updated 5 years ago
- ☆53Dec 21, 2022Updated 3 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- PTE hook☆35Jun 15, 2024Updated last year
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆116Aug 10, 2020Updated 5 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆345Apr 27, 2020Updated 5 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- ayy debuger☆89Mar 3, 2024Updated 2 years ago
- DllInject (Memory Load)☆11Jan 5, 2019Updated 7 years ago
- pubg_sdk☆11Jul 26, 2020Updated 5 years ago