hidden_syscall - syscaller without using syscall instruction in code
☆68Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for hidden_syscall
Users that are interested in hidden_syscall are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- base for testing☆187Sep 28, 2024Updated last year
- Written in a couple hours, don't judge :)☆17Jun 3, 2023Updated 2 years ago
- A plugin for x64dbg that can copy RVA from unknown memory pages☆35May 15, 2022Updated 3 years ago
- Detour library (x64 and x86 compatible)☆14Dec 15, 2020Updated 5 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- ☆19Feb 5, 2025Updated last year
- A simple C++ driver base with KD data block☆11Jun 25, 2022Updated 3 years ago
- ☆64Sep 28, 2022Updated 3 years ago
- nmi stackwalking + module verification☆165Dec 28, 2023Updated 2 years ago
- ☆43Apr 18, 2023Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Mar 16, 2026Updated last week
- ☆73Aug 31, 2022Updated 3 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Only for Stress-Testing☆26Apr 9, 2022Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Windows kernel driver that detects hypervisors by probing SIDT/LIDT edge cases, paging/TLB behaviors, privilege transitions, and timing e…☆37Mar 3, 2026Updated 2 weeks ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 5 years ago
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆17Feb 25, 2023Updated 3 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆554Nov 12, 2022Updated 3 years ago
- ☆158May 21, 2024Updated last year
- Drawing from kernelmode without any hooks☆174Jul 7, 2022Updated 3 years ago
- PAGE_GUARD based hooking library☆52Jul 25, 2022Updated 3 years ago
- A simple ida python script to find .data ptr☆59May 6, 2023Updated 2 years ago
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Feb 17, 2023Updated 3 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Oct 29, 2019Updated 6 years ago
- ☆48Jul 7, 2024Updated last year
- ☆23May 8, 2023Updated 2 years ago
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆22Feb 19, 2023Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆104Jun 26, 2023Updated 2 years ago
- Analyze tool for windows reverser☆31Mar 6, 2023Updated 3 years ago
- ☆19Apr 14, 2023Updated 2 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆57May 23, 2022Updated 3 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆106Mar 16, 2026Updated last week
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago