codereversing / guardpage_hookLinks
Hooking functions with guard pages
☆9Updated 2 years ago
Alternatives and similar repositories for guardpage_hook
Users that are interested in guardpage_hook are comparing it to the libraries listed below
Sorting:
- An idea in hooking APIs by replacing calls that lead to them☆1Updated 2 years ago
- Hooking functions with structured and vectored exception handling☆8Updated 2 years ago
- Call undocumented native functions in the windows kernel☆5Updated 2 years ago
- Plugins for Scylla☆19Updated 13 years ago
- ☆13Updated 9 years ago
- Given a global name in IDA Pro, find all xrefs which are contained in an exported function.☆11Updated 8 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Updated 6 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 12 years ago
- Proof of concept headless GUI DLL☆12Updated 3 years ago
- Enumerate process modules manually☆9Updated 2 years ago
- PE rebuilder, based on yoda's realigndll☆12Updated 13 years ago
- NoREpls - Application designed for the purposes of reverse engineering.☆11Updated 6 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- Sample debugger for x86 and x64☆4Updated 2 years ago
- Reverse engineering AddVectoredExceptionHandler☆3Updated 2 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- ☆12Updated 13 years ago
- Plugin for x64dbg to break on unresolved APIs.☆12Updated 7 years ago
- Contains various pintools to supplement the Intel DBI framework☆12Updated 10 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- easy detour-, vftable-, iat- and eathooking☆12Updated 9 years ago
- Hooking vtables☆10Updated 2 years ago
- A project dedicated towards researching the Windows operating system's kernel mode enviornment.☆8Updated 9 years ago
- WoW64 -> x64☆19Updated 8 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- MIR-Engine☆24Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- A python metamorphic engine for PE/PE+ files.☆15Updated 2 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Updated 7 years ago