vic4key / Cpp-Hooking
Cpp Hooking - Set up function hooking easily and writing less code (P.S You can also find the python version @ https://github.com/vic4key/py-hooking.git)
☆29Updated last year
Alternatives and similar repositories for Cpp-Hooking
Users that are interested in Cpp-Hooking are comparing it to the libraries listed below
Sorting:
- Debug Print viewer (user and kernel)☆66Updated last year
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- ☆27Updated last year
- PoC code for IsValidImageCRC()☆16Updated 2 years ago
- VMP Mutation API Fix☆41Updated 3 years ago
- Driver shared section communication☆50Updated last month
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- This is just a x64dbg script system support.☆46Updated 2 years ago
- ☆30Updated 7 months ago
- Kernel ReClassEx☆62Updated last year
- Windows kernel driver template for cmkr (with testsigning).☆33Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆69Updated last year
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 3 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- ☆36Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆58Updated last year
- Simple and lightweight hypervisor for AMD processors☆31Updated 4 months ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- Global DLL injector☆67Updated 3 years ago
- Process Creation, Image Load and Thread Creation Notification☆12Updated last year
- Symbolic Execution based on lifting amd64 to z3☆26Updated 10 months ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- Binary rewriter for 64-bit PE files.☆74Updated last year
- Native API header files for the Process Hacker project (nightly).☆26Updated this week
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆43Updated last year
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆35Updated last year
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆34Updated 7 months ago