secrary / Hooking-via-InstrumentationCallback
codes for my blog post: https://secrary.com/Random/InstrumentationCallback/
☆169Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Hooking-via-InstrumentationCallback
- Resolve DOS MZ executable symbols at runtime☆93Updated 3 years ago
- ☆152Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆206Updated 5 years ago
- Collect different versions of Crucial modules.☆127Updated 4 months ago
- Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆135Updated 5 years ago
- ☆66Updated 3 years ago
- ☆121Updated 4 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆73Updated 13 years ago
- APC Internals Research Code☆159Updated 4 years ago
- A quick-and-dirty anti-hook library proof of concept.☆101Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆102Updated 4 years ago
- Translates WinDbg "dt" structure dump to a C structure☆126Updated 8 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆89Updated 4 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆53Updated 5 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆67Updated 5 years ago
- windows kernelmode and usermode IAT hook☆142Updated 3 years ago
- Process Doppelgänging☆154Updated 6 years ago
- hook msr by amd svm☆119Updated 4 years ago
- Hide codes/data in the kernel address space.☆185Updated 3 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆197Updated 3 years ago
- Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303☆107Updated 6 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆117Updated 3 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆122Updated last month
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- A hypervisor hiding user-mode memory using EPT☆105Updated 6 years ago
- Kernel LdrLoadDll injector☆258Updated 6 years ago
- Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆161Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆226Updated 2 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 3 years ago