nblog / get_syscall_index
get ntdll syscall index
☆12Updated 4 years ago
Alternatives and similar repositories for get_syscall_index:
Users that are interested in get_syscall_index are comparing it to the libraries listed below
- Windows Kernel nt files - To research windows kernel☆15Updated 4 years ago
- hook system call that on user mode☆13Updated 3 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- APC注入DLL内核层☆23Updated 6 years ago
- A wrapper class to hide the original calling address of a function☆57Updated 4 years ago
- The driver STL library used by myself☆12Updated 2 years ago
- Hacker Disassembler Engine - mirro☆18Updated 2 years ago
- ☆15Updated 2 years ago
- ☆35Updated 4 years ago
- ☆17Updated 2 years ago
- ☆36Updated 2 years ago
- reveal and detect of common hooks under win32☆13Updated 4 years ago
- ☆18Updated 4 years ago
- Open Anti Cheat☆27Updated 2 years ago
- ☆20Updated 3 years ago
- A Simple Example☆21Updated 6 years ago
- ☆68Updated 2 years ago
- IDT HOOK KiPageFault test Modified from: github.com/kanren3/x64-IDT-HOOK☆16Updated 4 years ago
- ☆25Updated 7 years ago
- Easy to include string and wstring obfuscation☆18Updated 3 years ago
- ☆26Updated last year
- IO隐藏通信封装☆15Updated 3 years ago
- ☆68Updated 3 years ago
- simply manual map any system image☆17Updated 4 years ago
- PTE hook☆20Updated 10 months ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- eac memory sig maker☆12Updated 3 years ago
- bypass CRC☆11Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 3 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆43Updated 2 months ago