mrexodia / IATFakerLinks
Small project to generate fake DLLs based on an executable's import table
☆23Updated 5 years ago
Alternatives and similar repositories for IATFaker
Users that are interested in IATFaker are comparing it to the libraries listed below
Sorting:
- x64 assembler library☆31Updated last year
- ☆46Updated 6 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 4 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- ☆28Updated 2 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆41Updated 6 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆49Updated 4 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Updated 6 years ago
- Debug Print viewer (user and kernel)☆68Updated last year
- win32/x64 obfuscate framework☆32Updated 6 years ago
- A Windows API hooking library !☆31Updated 2 years ago
- ☆24Updated 6 years ago
- ☆36Updated 4 years ago
- Library for linking multiple PE\PE + files to one☆52Updated last year
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 5 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- Example of making debugger using Hardware Breakpoint + VEH☆18Updated 4 years ago
- The updated PE file manipulation library from RetDec project.☆21Updated last year
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆45Updated 2 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- A lightweight x86/x64 VM☆18Updated 4 years ago
- My research WIP bluepill hypervisor☆41Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆22Updated last year
- Global DLL injector☆68Updated 4 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 5 years ago