nblog / Win32-Hook-DemoLinks
reveal and detect of common hooks under win32
☆13Updated 4 years ago
Alternatives and similar repositories for Win32-Hook-Demo
Users that are interested in Win32-Hook-Demo are comparing it to the libraries listed below
Sorting:
- ☆48Updated 6 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- get ntdll syscall index☆12Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- x64 assembler library☆31Updated last year
- Very tiny and selective implementation of STL for Windows NT kernel mode drivers☆18Updated 4 years ago
- A simple example how to decrypt kernel debugger data block☆29Updated 4 years ago
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆14Updated 4 months ago
- eac memory sig maker☆13Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 6 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- A helper class for hardware breakpoints☆12Updated 5 years ago
- Injector with kernel power☆16Updated 4 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 4 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 7 years ago
- Some eternal WIP stuff :)☆18Updated 3 months ago
- ☆15Updated 4 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- ☆35Updated 4 years ago
- NT reversal☆25Updated 7 years ago
- P2C Loader based on blackbone, used by isolation.top and others.☆14Updated 7 years ago
- A small header file mapping status codes passed to KiExceptionDispatch before KiPreprocessFault to individual CPU faults.☆13Updated 6 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆23Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- Some crazy PE executables protection kernel driver☆18Updated 5 years ago
- ☆14Updated 2 years ago
- ☆27Updated 7 years ago
- Another method to anti ThreadHideFromDebugger☆36Updated 6 years ago
- direct systemcalls with a modern c++20 interface.☆43Updated 2 years ago