codereversing / apicall_replacement
An idea in hooking APIs by replacing calls that lead to them
☆1Updated 2 years ago
Related projects: ⓘ
- ☆11Updated this week
- simple plugin for lastest olly versions to display the callstack☆15Updated 11 years ago
- Windows Kernel Mode PCRE☆10Updated 9 years ago
- wow64 syscall filter☆13Updated 9 years ago
- ☆12Updated this week
- does reflective dll injection☆8Updated 10 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆12Updated 6 years ago
- A project dedicated towards researching the Windows operating system's kernel mode enviornment.☆8Updated 8 years ago
- ☆11Updated 9 years ago
- ☆13Updated 7 years ago
- ☆11Updated this week
- ☆12Updated this week
- Notes my learning steps about Windows-NT☆22Updated 7 years ago
- ☆7Updated 8 years ago
- Windows registry files interactive viewer☆9Updated 7 years ago
- Proof of concept headless GUI DLL☆12Updated 2 years ago
- The Windows driver and device management program for NDAS devices such as the NetDISK.☆16Updated 8 years ago
- Project for Injecting into Windows Processes☆13Updated 12 years ago
- ☆11Updated 7 years ago
- Hook APIs and send data back to another process with Google Protobufs☆2Updated 2 years ago
- Ssdt Hook Detection tool☆11Updated 7 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Updated 8 years ago
- ☆13Updated 8 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆10Updated 9 years ago
- Demos presented on Hackerfest 2015☆13Updated 8 years ago
- XenServer Windows Virtual Network Interface Device Driver☆12Updated 7 years ago
- Hooking functions with structured and vectored exception handling☆8Updated 2 years ago
- ☆16Updated 8 years ago
- ☆13Updated this week
- A system call tracer☆10Updated 9 years ago