h311d1n3r / LetsHook
A Windows API hooking library !
☆31Updated 2 years ago
Alternatives and similar repositories for LetsHook:
Users that are interested in LetsHook are comparing it to the libraries listed below
- Native API header files for the Process Hacker project (nightly).☆25Updated this week
- Single header library to simplify the usage of direct syscalls. x64/x86☆11Updated last year
- devirtualization vmprotect☆61Updated last year
- Input-output driver☆24Updated last year
- Collaboration platform for reverse engineering tools.☆39Updated last month
- Elevate arbitrary MSR writes to kernel execution.☆25Updated last year
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆24Updated last year
- ☆29Updated 3 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆18Updated 3 months ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- ☆36Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- EDR PoC WIP LLC☆10Updated 11 months ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- x64 assembler library☆32Updated 7 months ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆28Updated 2 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆62Updated last year
- ☆16Updated last year
- ☆26Updated last year
- Bypassing kernel patch protection runtime☆19Updated last year
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆42Updated 3 years ago