Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.
☆32May 18, 2022Updated 3 years ago
Alternatives and similar repositories for intraceptor
Users that are interested in intraceptor are comparing it to the libraries listed below
Sorting:
- ☆12Oct 12, 2021Updated 4 years ago
- eac memory sig maker☆14Jun 10, 2021Updated 4 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- Load Dll into Kernel space☆40Aug 23, 2022Updated 3 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆20Jul 31, 2019Updated 6 years ago
- [POC Detected]Bypass BE Anti Dll Injection (POC/Need Driver)☆17Mar 30, 2020Updated 5 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 3 years ago
- ☆17Apr 21, 2022Updated 3 years ago
- A minimalistic way to spoof return addresses without using exceptions☆17Jul 26, 2022Updated 3 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆561Jan 4, 2025Updated last year
- Decoder for VMProtect hwids☆18Aug 1, 2022Updated 3 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- Yet Another SetWindowsHookExW Injector☆17Nov 3, 2019Updated 6 years ago
- Register a callback from a Manually mapped kernel module☆16Feb 1, 2022Updated 4 years ago
- An example of Windows NT Native API application and kernel driver☆22Feb 10, 2020Updated 6 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Sep 12, 2022Updated 3 years ago
- ☆49Feb 21, 2022Updated 4 years ago
- ☆69Aug 31, 2021Updated 4 years ago
- ☆15Sep 26, 2021Updated 4 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆33Nov 3, 2019Updated 6 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆118May 29, 2025Updated 9 months ago
- Stealing signatures from pe files☆15Apr 1, 2025Updated 11 months ago
- ☆20May 17, 2022Updated 3 years ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆28Feb 3, 2024Updated 2 years ago
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Feb 17, 2023Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- 2022 Updated Kernelmode-Code☆33Mar 23, 2024Updated last year
- A simple way to spoof return addresses using an exception handler☆43Aug 3, 2022Updated 3 years ago
- An ark tool's driver☆40May 11, 2017Updated 8 years ago