hercul3s / Packet-SnifferLinks
Packet Logger / Decryptor in Network Layer via WinDivert.
☆27Updated 3 years ago
Alternatives and similar repositories for Packet-Sniffer
Users that are interested in Packet-Sniffer are comparing it to the libraries listed below
Sorting:
- ☆7Updated 7 years ago
- ☆46Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆54Updated 8 months ago
- Simple and lightweight hypervisor for AMD processors☆33Updated 6 months ago
- hook detector☆29Updated 3 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago
- clearing traces of a loaded driver☆47Updated 2 years ago
- A simple Kernel Mode Anticheat Project open to developement.☆14Updated 4 years ago
- Memory integrity check with CRC32 instruction, section-based☆43Updated last month
- PAGE_GUARD based hooking library☆46Updated 2 years ago
- A library to assist with memory & code protection.☆59Updated last year
- ☆50Updated last year
- ☆80Updated 3 years ago
- ☆74Updated 2 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆57Updated 2 years ago
- ☆25Updated last year
- UM-KM Communication using registry callbacks☆39Updated 5 years ago
- Disk based DMA for ATA and SCSI☆23Updated last year
- POC Hook of nt!HvcallCodeVa☆52Updated 2 years ago
- 将驱动映射到会话空间☆35Updated 2 years ago
- ☆30Updated 9 months ago
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆8Updated this week
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- ☆31Updated 3 years ago
- Hardware ID☆48Updated 3 years ago
- ☆46Updated 3 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago