nblog / Win32-Hook-Demo
reveal and detect of common hooks under win32
☆13Updated 4 years ago
Alternatives and similar repositories for Win32-Hook-Demo:
Users that are interested in Win32-Hook-Demo are comparing it to the libraries listed below
- get ntdll syscall index☆12Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- x64 assembler library☆31Updated 9 months ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated last year
- ☆15Updated 4 years ago
- Open Anti Cheat☆27Updated 2 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- simply manual map any system image☆16Updated 4 years ago
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆13Updated last week
- Some crazy PE executables protection kernel driver☆18Updated 4 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆22Updated 7 years ago
- ☆34Updated 4 years ago
- Kernel Hook X64☆21Updated 4 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- Some eternal WIP stuff :)☆16Updated this week
- Hacker Disassembler Engine - mirro☆17Updated 2 years ago
- Injector with kernel power☆16Updated 4 years ago
- pdb's function and global vars to offset☆10Updated last year
- An example code of CiGetCertPublisherName☆14Updated 3 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 6 months ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- Another method to anti ThreadHideFromDebugger☆35Updated 6 years ago
- bypass CRC☆11Updated 6 years ago
- Disable threat tracing from the kernel..☆13Updated 2 years ago
- Windows Console Monitor☆33Updated 5 years ago
- Simulate SendInput with ClassService☆31Updated 6 years ago
- ☆21Updated 2 years ago
- ☆27Updated last year
- A small header file mapping status codes passed to KiExceptionDispatch before KiPreprocessFault to individual CPU faults.☆13Updated 5 years ago
- eac memory sig maker☆12Updated 3 years ago