bytewreck / hook-busterView external linksLinks
Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.
☆36May 12, 2022Updated 3 years ago
Alternatives and similar repositories for hook-buster
Users that are interested in hook-buster are comparing it to the libraries listed below
Sorting:
- ☆17Apr 18, 2023Updated 2 years ago
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Aug 21, 2024Updated last year
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- Auditing Hooks for https://github.com/jborean93/PSDetour☆13Apr 29, 2025Updated 9 months ago
- 🪝 Various EPT hook detection approaches☆143Jul 29, 2025Updated 6 months ago
- POC about how to prevent windbg break☆15Oct 3, 2022Updated 3 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- Windows Explorer application written in assembly☆15Jun 15, 2023Updated 2 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆17Apr 21, 2022Updated 3 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- Static Library For Windows Drivers☆41Dec 13, 2025Updated 2 months ago
- Debug Print viewer (user and kernel)☆71Feb 7, 2024Updated 2 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Small handy tool for crafting shellcodes by hand.☆18Apr 20, 2022Updated 3 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Jul 9, 2021Updated 4 years ago
- A code parser for C-Style header files that lets you to parse function's prototypes and data types used in their parameters.☆94Apr 17, 2022Updated 3 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Aug 3, 2023Updated 2 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- ☆64Feb 23, 2025Updated 11 months ago
- ☆21May 26, 2023Updated 2 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆265Nov 18, 2022Updated 3 years ago
- Bypassing PatchGuard on modern x64 systems☆265Apr 9, 2023Updated 2 years ago
- Detect strange memory regions and DLLs☆185Jan 20, 2022Updated 4 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- ☆20May 17, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 3 years ago
- APC Internals Research Code☆167Jun 28, 2020Updated 5 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆116Feb 1, 2022Updated 4 years ago