hooks gServerHandlers xxxEventWndProc
☆13May 1, 2022Updated 3 years ago
Alternatives and similar repositories for kernel-windowless-wndproc-hook
Users that are interested in kernel-windowless-wndproc-hook are comparing it to the libraries listed below
Sorting:
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago
- Visual Studio template for GNU-EFI☆16May 16, 2022Updated 3 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆20Sep 1, 2022Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- ☆19Apr 14, 2023Updated 2 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆24May 17, 2022Updated 3 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- ☆49Feb 21, 2022Updated 4 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- ☆20May 17, 2022Updated 3 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆38May 12, 2022Updated 3 years ago
- type 2 thin hypervisor written in c++☆21Jan 11, 2025Updated last year
- ☆37May 21, 2022Updated 3 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆21Aug 14, 2021Updated 4 years ago
- ☆58Mar 14, 2023Updated 2 years ago
- ☆36Mar 27, 2022Updated 3 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- 将驱动映射到会话空间☆38Aug 27, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- ☆16Apr 10, 2025Updated 10 months ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- ☆47Feb 27, 2022Updated 4 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆35Mar 23, 2024Updated last year
- https://githacks.org/Shawick/goodeye.git☆52Sep 2, 2020Updated 5 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 3 years ago
- Freaking Injector is a tool which made for injecting dlls into other processes in Windows x64 systems with bunch of diffrent injection me…☆11Dec 3, 2020Updated 5 years ago
- A minimal CR3 protection PoC (KdpTrap hook)☆15Jan 25, 2025Updated last year
- Shellcode execution for memflow☆13Apr 11, 2022Updated 3 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- ☆17Jul 2, 2022Updated 3 years ago