illegal-instruction-co / II-ExternalHookingLib
External Hooking ( Bypasss process byte patching checks | Injector included )
☆21Updated last year
Related projects: ⓘ
- comparing data of module exports from disk and memory, then caching any differences.☆23Updated 2 years ago
- ☆42Updated 2 years ago
- Helps to find patched modules☆26Updated 3 years ago
- C/C++ example of InjectMouseInput function☆29Updated 3 years ago
- fecurity executor from factory☆32Updated 2 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆22Updated 3 years ago
- UM-KM Communication using registry callbacks☆35Updated 4 years ago
- Mapping your code on a 0x1000 size page☆66Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14Updated 4 years ago
- A simple MmCopyMemory hook.☆32Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆21Updated 3 years ago
- ☆48Updated 9 months ago
- Mono process injector☆22Updated 5 years ago
- UAC - Cheat developer platform☆28Updated 2 years ago
- ☆76Updated 3 years ago
- ☆31Updated this week
- ☆33Updated this week
- ☆28Updated this week
- ☆15Updated this week
- ☆13Updated this week
- ☆41Updated this week
- ☆41Updated this week
- mouseclassservicecallback detection via hook☆46Updated 2 years ago
- Simple memory obfuscator.☆23Updated 2 years ago
- ☆19Updated 2 years ago
- ☆33Updated 2 years ago
- ☆25Updated this week
- Only for Stress-Testing☆21Updated 2 years ago
- ☆17Updated 2 years ago
- Achieving code execution through abusing VEH☆15Updated last year