gfreivasc / VEHHookLinks
Vector Exception Handling Hook
☆23Updated 8 years ago
Alternatives and similar repositories for VEHHook
Users that are interested in VEHHook are comparing it to the libraries listed below
Sorting:
- ☆100Updated last year
- ☆52Updated last year
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆126Updated 3 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆89Updated 6 years ago
- VMP Mutation API Fix☆43Updated 3 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Updated 2 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆74Updated 2 years ago
- A debugger library using VEH.☆64Updated 11 months ago
- ☆53Updated 2 years ago
- ☆69Updated 4 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆93Updated 5 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- ☆73Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 4 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆54Updated 3 years ago
- A simple kernel-level plugin for ReClass.NET☆36Updated 7 years ago
- ☆22Updated 3 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆53Updated last year
- page table manipulation to gain physical r/w☆44Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Updated 2 years ago
- Top level overlay drawing for game cheating using dwm.exe☆45Updated 3 years ago
- ☆36Updated 5 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆105Updated 2 years ago
- Driver hooks a function from NT windows. read/write memory and use windows GDI to draw on buffer from kernel.☆36Updated 3 years ago
- first commit☆62Updated 4 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆49Updated 4 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- POC usermode <=> kernel communication via ALPC.☆63Updated last year