s18leoare / Hackshield-Driver-BypassLinks
Bypass HackShield several specific SSDT hook in Ring0
☆24Updated 10 years ago
Alternatives and similar repositories for Hackshield-Driver-Bypass
Users that are interested in Hackshield-Driver-Bypass are comparing it to the libraries listed below
Sorting:
- UI application that can compare PE images in memory or in raw PE file☆19Updated 11 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- A command line tool to load and unload a device driver.☆47Updated 8 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Updated 11 years ago
- Code Injection technique written in cpp language☆33Updated 7 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- a network filter using NDIS hook technique☆19Updated 12 years ago
- PE Infector/Cryptor source code☆16Updated 8 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- The dll that can hide itself and then delete itselft.☆31Updated 12 years ago
- ☆15Updated last year
- Protect process fsfilter driver. Windows x64☆36Updated 9 years ago
- Wow64 syscall hook☆41Updated 8 years ago
- ☆36Updated 8 years ago
- Hidden module/dll detector for windows apps☆15Updated 8 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Updated 7 years ago
- XDK is a fully featured C++ wrapper library for Windows kernel development☆20Updated 9 years ago
- windows kernel File redirection☆20Updated 11 years ago
- An ark tool's driver☆40Updated 8 years ago
- ☆33Updated 4 years ago
- simple PE packer written in C++☆56Updated 7 years ago
- ☆17Updated 8 years ago
- ☆24Updated 7 years ago
- Ssdt Hook Detection tool☆13Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆26Updated 11 years ago
- Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!☆33Updated 10 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 7 years ago