hasherezade / detours_cmake_tplLinks
A CMake template for projects using MS Detours
☆24Updated 9 months ago
Alternatives and similar repositories for detours_cmake_tpl
Users that are interested in detours_cmake_tpl are comparing it to the libraries listed below
Sorting:
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 2 years ago
- A ready-made template for a project based on libpeconv.☆51Updated last month
- Miscellaneous Code and Docs☆84Updated 4 months ago
- Standalone program to download PDB Symbol files for debugging without WDK☆78Updated 6 years ago
- C++ library for low-level Windows development☆81Updated last year
- A driver to intercept low level windows events☆63Updated 6 years ago
- Debug Print viewer (user and kernel)☆69Updated last year
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- A Windows API hooking library !☆31Updated 3 years ago
- View handles and object for each object type☆64Updated 6 years ago
- A set of small utilities, helpers for PIN tracers☆34Updated 2 months ago
- A simple password-based PE encryptor for Windows 32-bit executables.☆53Updated 10 months ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 5 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- PoC for hiding PE exports☆67Updated 4 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- A template for projects using both libPeConv and MS Detours☆16Updated 2 months ago
- ☆18Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆55Updated 4 months ago
- Static library and headers for linking your software with ntdll.dll☆37Updated 5 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Updated 7 years ago
- Library for using direct system calls☆36Updated 10 months ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Updated 5 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 5 years ago
- Simple windows API logger☆109Updated 6 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆52Updated 4 years ago
- Load and unload a DLL into an remote process without using WriteProcessMemory ;)☆16Updated 11 years ago
- Record & prevent file deletion in kernel mode☆44Updated 5 years ago
- GetHooks is a program designed for the passive detection and monitoring of hooks from a limited user account.☆61Updated 4 years ago