proxytype / Hide-FS
Inject dll to explorer.exe and hide file from process.
☆21Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Hide-FS
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆42Updated 3 years ago
- Injector with kernel power☆16Updated 3 years ago
- Simple driver loader for windows☆18Updated 4 years ago
- Stealing signatures from pe files☆15Updated 2 years ago
- hook KeyboardClassServiceCallback to prevent messing up sistema☆20Updated last year
- Simple memory obfuscator.☆24Updated 2 years ago
- ☆18Updated 2 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- Register a callback from a Manually mapped kernel module☆12Updated 2 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Updated 2 years ago
- Microsoft Redistributable Download & Installer☆17Updated 5 years ago
- Disable threat tracing from the kernel..☆12Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated last year
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- x64 Windows privilege elevation using anycall☆20Updated 3 years ago
- PAGE_GUARD based hooking library☆40Updated 2 years ago
- simply manual map any system image☆16Updated 3 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆25Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆18Updated 3 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 3 years ago
- neat way to detect memory read using nt layer function.☆14Updated last year
- manual mapping injector☆26Updated 2 years ago
- .net based packer/obfuscator with apc based pe injection☆15Updated 8 years ago