codereversing / directx9hookLinks
Runtime DirectX9 Hooking
☆16Updated 3 years ago
Alternatives and similar repositories for directx9hook
Users that are interested in directx9hook are comparing it to the libraries listed below
Sorting:
- Winsock inspection/filtering/modifying☆19Updated 3 years ago
- Data and class remodeling library☆67Updated 9 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆34Updated 13 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- Hooking vtables☆10Updated 3 years ago
- Intercept arbitrary functions at run-time, without knowing their typedefs☆88Updated 8 years ago
- PE Infector/Cryptor source code☆21Updated 3 years ago
- x86/x86-64 hooking library☆67Updated 8 years ago
- Simple standalone bundle of NT core APIs☆25Updated 9 years ago
- Identifying Virtual Table Functions using VTBL IDA Pro Plugin + Deviare Hooking Engine☆97Updated 12 years ago
- Windows memory hacking library☆21Updated 9 years ago
- Windows driver for profiling and debugging ring 3 applications☆51Updated 13 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Updated 12 years ago
- ☆71Updated 4 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 8 years ago
- Portable Reverse Engineering Framework☆142Updated 8 years ago
- SC2/HotS GalaxyScript VM & bytecode research☆26Updated 9 years ago
- Plugin adding multi-binary project support to IDA Pro (WIP)☆29Updated 9 years ago
- IDA plugin to patch IDA Pro in memory.☆49Updated 9 years ago
- A simple Windows x86-32 debugger☆10Updated 9 years ago
- ☆55Updated 13 years ago
- windows create process with a dll load first time via LdrHook☆31Updated 9 years ago
- Anti-Anti-Debugger Plugins☆20Updated 12 years ago
- Ida Pro Ultimate Qt Build Guide☆27Updated 6 years ago
- CaptainHook is perfect x86/x64 hook environment☆106Updated 8 years ago
- The dll that can hide itself and then delete itselft.☆31Updated 12 years ago
- A simple tool to help you capture Ioctls.☆20Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Updated 12 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- ☆32Updated 3 years ago