jnastarot / cleancallView external linksLinks
Library for using direct system calls
☆36Jan 30, 2025Updated last year
Alternatives and similar repositories for cleancall
Users that are interested in cleancall are comparing it to the libraries listed below
Sorting:
- ☆17Feb 29, 2020Updated 5 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- (shard of furikuri project) assambler for code obfuscation☆19Oct 29, 2019Updated 6 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆38Dec 10, 2018Updated 7 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Jul 6, 2018Updated 7 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆117May 26, 2020Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- APC注入DLL内核层☆23Dec 8, 2018Updated 7 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Recreation of Lode Runner The Legend Returns☆14Feb 13, 2020Updated 6 years ago
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Jan 2, 2021Updated 5 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- Microsoft Redistributable Download & Installer☆18Oct 14, 2019Updated 6 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Simple header only library to change return address on current stack frame.☆22Sep 4, 2016Updated 9 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago
- too busy for that all, furikuri is framework for code protection☆164Nov 2, 2019Updated 6 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- ☆19Jun 20, 2019Updated 6 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆31Nov 9, 2021Updated 4 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- ☆10Aug 16, 2019Updated 6 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- ☆16Apr 21, 2023Updated 2 years ago