ekknod / SetWindowHookEx
Using SetWindowHookEx for preinjected DLL's
☆57Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for SetWindowHookEx
- Only for Stress-Testing☆22Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- https://githacks.org/Shawick/goodeye.git☆44Updated 4 years ago
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆58Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆80Updated 2 years ago
- Compile-Time Calls Obfuscator for C++14+☆34Updated 11 months ago
- manual mapping injector☆26Updated 2 years ago
- fecurity executor from factory☆33Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆41Updated 6 years ago
- Fully UD On EAC Now Enjoy Pasters :)☆15Updated last year
- ☆50Updated 10 months ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year
- Compileable POC of namazso's x64 return address spoofer.☆47Updated 4 years ago
- ☆78Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated last year
- ☆44Updated 2 years ago
- PAGE_GUARD based hooking library☆39Updated 2 years ago
- A simple MmCopyMemory hook.☆33Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆49Updated last year
- ☆17Updated 2 years ago
- clearing traces of a loaded driver☆44Updated 2 years ago