jnastarot / furikuri
too busy for that all, furikuri is framework for code protection
☆151Updated 4 years ago
Related projects: ⓘ
- x64 syscall caller in C++.☆84Updated 6 years ago
- Obfuscate calls to imports by patching in stubs☆58Updated 3 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆63Updated 5 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆82Updated 11 months ago
- ☆120Updated 4 years ago
- C++ 17 compile time string encryption supporting vs2010-2019☆72Updated 4 years ago
- Manual PE image mapper☆59Updated 11 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆108Updated 2 years ago
- ☆150Updated 4 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆70Updated 11 months ago
- Code injection by hijacking threads in Windows 32-bit applications☆42Updated 5 years ago
- Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.☆57Updated 5 years ago
- Intercepting DeviceControl via WPP☆125Updated 4 years ago
- Windows Driver Kit Extesion Header (Undoc)☆132Updated 2 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆113Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆93Updated 2 years ago
- A library to read physical memory and system-wide virtual memory.☆119Updated 6 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆63Updated 3 years ago
- A quick-and-dirty anti-hook library proof of concept.☆100Updated 6 years ago
- fix vmprotect import function used unicorn-engine.☆91Updated last year
- Disable Driver Callbacks☆97Updated 6 years ago
- Hide function calls to prevent reverse-engineering☆64Updated 3 years ago
- x64 manual mapper using inline syscalls☆6Updated 3 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆111Updated 2 years ago
- the basic version of the ring0 physical memory read/write tool☆86Updated 5 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆120Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆188Updated 3 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆111Updated 5 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆85Updated 3 years ago
- scans through physical memory and paging tables in kernel mode☆104Updated 3 years ago