coltonon / RegHookEx
External mid-function hooking method to retrieve register data
☆87Updated 6 years ago
Alternatives and similar repositories for RegHookEx:
Users that are interested in RegHookEx are comparing it to the libraries listed below
- a more stable & secure read/write virtual memory for kernel mode drivers☆164Updated 5 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- driver mapper / capcom wrapper☆219Updated 5 years ago
- Simple mmapper which using UEFI runtime driver.☆81Updated 5 years ago
- ☆71Updated 5 years ago
- ☆164Updated 7 years ago
- Just my first IOCTL try☆72Updated 4 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆282Updated 4 years ago
- ☆139Updated 4 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 5 years ago
- Kernel Lazy Importer☆109Updated 11 months ago
- manually map driver for a signed driver memory space☆151Updated 4 years ago
- Intercepting DeviceControl via WPP☆131Updated 5 years ago
- ☆184Updated 5 years ago
- ☆50Updated 4 years ago
- 🥭windows memory library aimed towards game hacking☆40Updated 4 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆75Updated 6 years ago
- Disable Driver Callbacks☆102Updated 7 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆66Updated 6 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago
- A client-sided anti-cheat developed during a freelance project to "plug-in" to a proprietary client for a private server. Includes memory…☆56Updated 4 years ago
- BattlEye shellcodes tester☆140Updated 3 years ago
- ☆90Updated last year
- Proof of concept on how to bypass some limitations of a manual mapped driver☆168Updated 4 years ago
- ☆143Updated 4 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆90Updated 5 years ago
- 09/2021 reversal of EasyAntiCheat driver☆213Updated 3 years ago
- VAC2 Emulator & VAC3 Response Parser☆82Updated 7 years ago