secrary / Hooking-via-InstrumentationCallbackLinks
codes for my blog post: https://secrary.com/Random/InstrumentationCallback/
☆183Updated 8 years ago
Alternatives and similar repositories for Hooking-via-InstrumentationCallback
Users that are interested in Hooking-via-InstrumentationCallback are comparing it to the libraries listed below
Sorting:
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Updated 6 years ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆146Updated 6 years ago
- APC Internals Research Code☆168Updated 5 years ago
- ☆68Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Updated 6 years ago
- A quick-and-dirty anti-hook library proof of concept.☆105Updated 7 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Updated last year
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Updated 5 years ago
- x64 syscall caller in C++.☆93Updated 7 years ago