A quick-and-dirty anti-hook library proof of concept.
☆105Aug 29, 2018Updated 7 years ago
Alternatives and similar repositories for ReloadLibrary
Users that are interested in ReloadLibrary are comparing it to the libraries listed below
Sorting:
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Sep 16, 2020Updated 5 years ago
- 常用代码类☆13May 31, 2014Updated 11 years ago
- Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument…☆15Mar 4, 2018Updated 8 years ago
- Shareds for kernel developement☆29Dec 23, 2013Updated 12 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Process Doppelgänging☆162Dec 19, 2017Updated 8 years ago
- 快速内存搜索算法,商用级别☆137Nov 2, 2018Updated 7 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- A simple ransomware defender.It uses minifilter to filt "rewrite" and "delete" events in kernel.And it handles event in user mode.☆27Aug 14, 2018Updated 7 years ago
- PE permutation library☆277Apr 8, 2023Updated 2 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆207May 27, 2021Updated 4 years ago
- ☆163Oct 29, 2020Updated 5 years ago
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- C++ 17 compile time string encryption supporting vs2010-2019☆76Jun 25, 2020Updated 5 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- ☆18Oct 12, 2014Updated 11 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- PE(compressed dll) memory loader using nt api☆46Jul 3, 2017Updated 8 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- copy of tdifw lib☆10Jun 15, 2017Updated 8 years ago
- Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)☆25May 20, 2021Updated 4 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆59Sep 14, 2020Updated 5 years ago
- The Win32 Anti-Intrusion Library☆213May 30, 2019Updated 6 years ago
- ☆125May 23, 2020Updated 5 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆314Oct 18, 2018Updated 7 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆53Oct 14, 2018Updated 7 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆905Nov 21, 2019Updated 6 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago