illegal-instruction-co / II-ExternalHookingLib
External Hooking ( Bypasss process byte patching checks | Injector included )
☆21Updated last year
Alternatives and similar repositories for II-ExternalHookingLib:
Users that are interested in II-ExternalHookingLib are comparing it to the libraries listed below
- Helps to find patched modules☆27Updated 4 years ago
- ☆45Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- ☆15Updated 3 years ago
- Header only UM AC "bypass"☆17Updated 8 months ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- Mono process injector☆22Updated 5 years ago
- ☆40Updated 3 years ago
- ☆15Updated 2 years ago
- ☆14Updated last year
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆19Updated 3 years ago
- C/C++ example of InjectMouseInput function☆31Updated 3 years ago
- ☆78Updated 3 years ago
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆25Updated 3 years ago
- ☆19Updated 2 years ago
- x64 manual mapper using inline syscalls☆6Updated 3 years ago
- ☆18Updated 2 years ago
- ☆36Updated last year
- A lightweight BattlEye emulator of the launcher☆58Updated 2 years ago
- ☆19Updated 3 years ago
- Disable threat tracing from the kernel..☆12Updated 2 years ago
- Bypass using kernel driver (not finish).☆19Updated last year
- PAGE_GUARD based hooking library☆42Updated 2 years ago