idkhidden / WinApiPatcherLinks
WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.
☆42Updated 9 months ago
Alternatives and similar repositories for WinApiPatcher
Users that are interested in WinApiPatcher are comparing it to the libraries listed below
Sorting:
- codecave hook reverse engineering toolkit.☆36Updated last year
- spoof return address☆76Updated 2 years ago
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆39Updated last week
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆25Updated last year
- DSE & PG bypass via BYOVD attack☆51Updated last year
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆53Updated 4 months ago
- ntoskrnl .data hooks for UM-KM communication☆40Updated last year
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆32Updated last year
- browse microsoft driver server for potentially vulnerable drivers☆20Updated last year
- Tool to dump EFI runtime drivers.☆36Updated last year
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆70Updated 2 months ago
- Simple, fast and lightweight x86-64 Assembler Library for C++ / Header-Only☆57Updated last week
- ☆45Updated 4 months ago
- POC Hook of nt!HvcallCodeVa☆52Updated 2 years ago
- Usermode access to arbitrary physical memory☆13Updated 7 months ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆68Updated 3 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆22Updated 3 years ago
- ☆57Updated last year
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆64Updated 9 months ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆22Updated last year
- kernel-mode DLL Injector☆85Updated 2 months ago
- Kernel Level NMI Callback Blocker☆99Updated 9 months ago
- kernel to user mode APC injector☆45Updated 3 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆122Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆178Updated 5 months ago
- manual map unsigned driver over signed memory☆196Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆46Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆32Updated 8 months ago
- Fully working kernel-mode VAC bypass☆75Updated 4 months ago