Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.
☆35Mar 23, 2024Updated last year
Alternatives and similar repositories for ThreadIn
Users that are interested in ThreadIn are comparing it to the libraries listed below
Sorting:
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆60Jan 31, 2024Updated 2 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆19Feb 25, 2023Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆103Jun 26, 2023Updated 2 years ago
- Lightweight Threat Detection System - (Base)☆15Apr 15, 2024Updated last year
- Achieving code execution through abusing vectored exception handling☆17May 28, 2023Updated 2 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Simple tool to dump/hide services in services.exe process.☆14Apr 22, 2022Updated 3 years ago
- ☆136Aug 6, 2022Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- A poc that abuses Enclave☆40Sep 8, 2022Updated 3 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- ☆58Mar 14, 2023Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆324Apr 26, 2022Updated 3 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆115Dec 28, 2022Updated 3 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆64Aug 14, 2023Updated 2 years ago
- Simple program to stream offsets for your game cheat, Was reversing some p2c and decided to recreate a better version of this function fo…☆11Sep 12, 2022Updated 3 years ago
- ☆16Apr 10, 2025Updated 10 months ago
- spoof page-table-entry nx bit☆10Feb 16, 2022Updated 4 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- simple zero-dependency timer implementation☆12May 24, 2023Updated 2 years ago
- ☆14May 10, 2021Updated 4 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆276Aug 25, 2023Updated 2 years ago
- ☆144Dec 10, 2022Updated 3 years ago
- ☆47Feb 27, 2022Updated 4 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- ☆148Jan 24, 2024Updated 2 years ago
- ☆193May 1, 2023Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Dec 27, 2022Updated 3 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago