jayo78 / basic-hookingLinks
Examples of basic windows API hooking techniques
☆20Updated 5 years ago
Alternatives and similar repositories for basic-hooking
Users that are interested in basic-hooking are comparing it to the libraries listed below
Sorting:
- Hide DLL / Hide Module / Hide Dynamic Link Library☆108Updated 6 years ago
- LSASS INJECTOR☆35Updated 7 years ago
- Windows Kernel Driver dlls injector using APC☆63Updated 7 years ago
- A quick-and-dirty anti-hook library proof of concept.☆105Updated 7 years ago
- Kernel LdrLoadDll injector☆265Updated 7 years ago
- x64 syscall caller in C++.☆93Updated 7 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆86Updated 6 years ago
- Exploit MsIo vulnerable driver☆124Updated 4 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆65Updated 2 years ago
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- Elevate a process to be a protected process☆155Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆83Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆72Updated 4 years ago
- too busy for that all, furikuri is framework for code protection☆162Updated 6 years ago
- ☆156Updated 6 years ago
- Inject a Dll from memory☆45Updated 6 years ago
- Protect a process from code injection, termination and hooking☆49Updated 4 years ago
- A library with four different methods to execute shellcode in a process☆26Updated 5 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆71Updated 3 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Updated 6 years ago
- A modern, mod independent open source cheat for Enemy Territory☆70Updated last month
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆141Updated 4 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆59Updated 3 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 3 years ago
- force delete runing .exe application file.or delete any locked file☆73Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Updated 4 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Updated 5 years ago