f4rb3r1o / vmt-hookingLinks
VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when the process calls a virtual function and fetches the function pointer to be called, it will eventually execute your code. In this example, I've create a buggy application that suffers from a data leak vulnerabili…
☆14Updated 5 years ago
Alternatives and similar repositories for vmt-hooking
Users that are interested in vmt-hooking are comparing it to the libraries listed below
Sorting:
- Remote memory library in C++17.☆34Updated 7 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- ☆31Updated 4 years ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- PoC that measures how long it takes the CPU to execute the CPUID instruction and reports if it suspects a VM. Works on both Windows and L…☆26Updated 5 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- ☆28Updated 2 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.☆29Updated 5 months ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆70Updated 5 years ago
- x64 syscall caller in C++.☆93Updated 7 years ago
- x64 assembler library☆31Updated last year
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆42Updated 5 years ago
- Lightweight x86-64 disassembling library☆44Updated 3 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆27Updated 7 years ago
- Feature-rich C99 library for memory scanning purposes, designed for Windows running machines, meant to work on both 32-bit and 64-bit por…☆32Updated 2 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆66Updated 2 years ago
- This is the documentation of HyperDbg Debugger. You can also visit https://docs.hyperdbg.org☆23Updated last month
- ☆26Updated 2 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- A simple library which provides a way to read and write the memory of other processes☆56Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 7 years ago
- ☆38Updated 2 years ago
- ☆44Updated 7 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆26Updated 2 years ago
- A bunch of architectural headers for i386 and AMD64☆40Updated 2 years ago
- driver interface with dll-injection capabilities☆28Updated 5 years ago
- Simple and lightweight hypervisor for AMD processors☆41Updated last month
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 4 years ago