f4rb3r1o / vmt-hookingLinks
VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when the process calls a virtual function and fetches the function pointer to be called, it will eventually execute your code. In this example, I've create a buggy application that suffers from a data leak vulnerabili…
☆14Updated 5 years ago
Alternatives and similar repositories for vmt-hooking
Users that are interested in vmt-hooking are comparing it to the libraries listed below
Sorting:
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆71Updated 5 years ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- Hypervisor-based debugger for AMD processors☆59Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- ☆52Updated 3 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆40Updated 2 years ago
- x64 syscall caller in C++.☆93Updated 7 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆57Updated 3 years ago
- Tutorial on solving a VM based CrackMe.☆66Updated 5 years ago
- x86-64 user mode emulation using Zydis☆68Updated last month
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆78Updated 3 years ago
- Function hooks in Windows NT Kernel☆25Updated 5 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆43Updated 5 years ago
- ☆46Updated 3 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆95Updated 2 years ago
- ☆38Updated 2 years ago
- capcom-like executor for any physmem driver☆56Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- ☆26Updated last year
- Fetch PDB symbols directly from Microsoft's symbol servers☆41Updated 3 years ago
- devirtualization vmprotect☆62Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆72Updated 2 years ago
- A lightweight BattlEye emulator of the launcher☆60Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆81Updated 4 years ago
- ☆30Updated 3 years ago
- x64dbg python3 plugin☆27Updated 2 months ago
- Process hiding library☆19Updated 5 years ago