hooks gServerHandlers xxxEventWndProc
☆13May 1, 2022Updated 3 years ago
Alternatives and similar repositories for kernel-windowless-wndproc-hook
Users that are interested in kernel-windowless-wndproc-hook are comparing it to the libraries listed below
Sorting:
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago
- Visual Studio template for GNU-EFI☆16May 16, 2022Updated 3 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- ☆19Apr 14, 2023Updated 2 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- ☆24May 17, 2022Updated 3 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆20Sep 1, 2022Updated 3 years ago
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- ☆37May 21, 2022Updated 3 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- ☆36Mar 27, 2022Updated 3 years ago
- Achieving code execution through abusing vectored exception handling☆17May 28, 2023Updated 2 years ago
- ☆49Feb 21, 2022Updated 4 years ago
- 将驱动映射到会话空间☆38Aug 27, 2022Updated 3 years ago
- ☆47Feb 27, 2022Updated 4 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Aug 14, 2021Updated 4 years ago
- Disk based DMA for ATA and SCSI☆42Sep 22, 2023Updated 2 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆57Mar 14, 2023Updated 3 years ago
- ☆34Oct 10, 2023Updated 2 years ago
- https://githacks.org/Shawick/goodeye.git☆52Sep 2, 2020Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- ☆20May 17, 2022Updated 3 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- type 2 thin hypervisor written in c++☆21Jan 11, 2025Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆35Mar 23, 2024Updated last year
- base for testing☆187Sep 28, 2024Updated last year
- Decrypts multiple BattlEye packets from BEService<>BEDaisy (including those with multiple encryption layers) out to a console.☆28Apr 14, 2022Updated 3 years ago
- A poc that abuses Enclave☆40Sep 8, 2022Updated 3 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 3 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago