khalladay / hooking-by-example
A series of increasingly complex programs demonstrating function hooking on 64 bit Windows. Culminating in a program that hooks mspaint to make it always paint orange.
☆297Updated 3 years ago
Alternatives and similar repositories for hooking-by-example:
Users that are interested in hooking-by-example are comparing it to the libraries listed below
- A bunch of Windows anti-debugging tricks for x86 and x64.☆776Updated 3 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆530Updated 2 months ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆589Updated 5 years ago
- Some DLL Injection techniques in C++ implemented for both x86 and x64 windows OS processes☆333Updated 3 years ago
- Inline syscalls made easy for windows on clang☆693Updated 8 months ago
- A wrapper library around native windows sytem APIs☆427Updated 4 years ago
- anti debugging library in c++.☆536Updated last year
- DLL scatter manual mapper☆732Updated 3 years ago
- The functions interception library written on pure C and NativeAPI with UserMode and KernelMode support☆734Updated last year
- C++ graphics kernel subsystem hook☆498Updated 4 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆289Updated 6 years ago
- Manual mapping without creating any threads, with rw only access☆725Updated 5 years ago
- Anti-cheat library for Windows C++☆431Updated 2 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆404Updated last year
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆550Updated 3 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆479Updated 2 years ago
- Access without a real handle☆921Updated 3 years ago
- Literally, the perfect injector.☆911Updated last year
- Rendering on external windows via hijacking thread contexts☆381Updated 4 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆399Updated 7 months ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆505Updated 6 years ago
- heavily vectorized c++17 compile time string encryption.☆1,256Updated 3 years ago
- Anti-debugging techniques on a (bad looking) Win32 application.☆237Updated 11 months ago
- Reversing EasyAntiCheat.☆540Updated 5 years ago
- COFF and Portable Executable format described using standard C++ with no dependencies.☆275Updated this week
- C++23 procedure hooking library.☆455Updated last week
- Simple code to manipulate the memory of a usermode process from kernel.☆273Updated 8 years ago
- Detours with just single dependency - NTDLL☆618Updated 2 years ago
- C++ 17 or higher control flow obfuscation library for windows binaries☆344Updated 6 months ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆537Updated 2 months ago