ssnob / process-redir-mapperLinks
Manually maps a DLL & replaces a target process's entry point.
☆15Updated 3 months ago
Alternatives and similar repositories for process-redir-mapper
Users that are interested in process-redir-mapper are comparing it to the libraries listed below
Sorting:
- Single header library to simplify the usage of direct syscalls. x64/x86☆12Updated 2 years ago
- monitors hidden syscalls called from call of duty anticheat☆80Updated 5 months ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆50Updated last month
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Updated 2 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆54Updated 8 months ago
- Compileable POC of namazso's x64 return address spoofer.☆52Updated 5 years ago
- Collection of Cheat dumps for Research and Detection.☆14Updated last week
- ASUSTeK AsIO3 I/O driver unlock☆21Updated 4 years ago
- ☆21Updated 4 months ago
- Port of zentool to Windows☆24Updated 3 months ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆38Updated 2 weeks ago
- devirtualization vmprotect☆62Updated 2 years ago
- ANY.RUN sandbox detection collection☆19Updated 10 months ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆45Updated 2 years ago
- C++ console logging library (fmt wrapper)☆17Updated 5 years ago
- anti breakpoint using job objects in a simple way.☆13Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆36Updated last year
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆48Updated 3 months ago
- x64 Windows privilege elevation using anycall☆21Updated 4 years ago
- x86-64 user mode emulation using Zydis☆47Updated 5 months ago
- Just tried, unusable☆41Updated 8 months ago
- Function hooks in Windows NT Kernel☆23Updated 4 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆38Updated 8 months ago
- Collaboration platform for reverse engineering tools.☆40Updated 6 months ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 3 years ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Updated 3 months ago
- Me fockin' pe protector☆45Updated 2 years ago
- ☆30Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago