vovkos / protolesshooksLinks
API monitoring via return-hijacking thunks; works without information about target function prototypes.
☆118Updated 5 years ago
Alternatives and similar repositories for protolesshooks
Users that are interested in protolesshooks are comparing it to the libraries listed below
Sorting:
- usermode standalone kernel interface☆111Updated 7 years ago
 - ☆131Updated last year
 - Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
 - Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆89Updated 9 years ago
 - CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆144Updated 5 years ago
 - ☆34Updated 7 years ago
 - Standalone program to download PDB Symbol files for debugging without WDK☆78Updated 6 years ago
 - A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Updated 5 years ago
 - Simple project that demonstrates how an ETW consumer can be created just by using NTDLL☆144Updated 6 years ago
 - This project aims to facilitate debugging a kernel driver in windows by adding support for a code change on the fly without reboot/unload…☆171Updated 2 years ago
 - Enumerate user mode shared memory mappings on Windows.☆125Updated 4 years ago
 - ☆68Updated 4 years ago
 - Translates WinDbg "dt" structure dump to a C structure☆132Updated 9 years ago
 - Sample project for kernel debugging automation with Vagrant☆60Updated 5 years ago
 - Parser for Microsoft Program Database (PDB) files☆77Updated 5 years ago
 - ☆108Updated 7 years ago
 - Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Updated 6 years ago
 - A Windows kernel dump C++ parser library with Python 3 bindings.☆207Updated 3 weeks ago
 - codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆181Updated 7 years ago
 - Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Updated 4 years ago
 - An automatic tool for fixing dumped PE files☆42Updated 5 years ago
 - Figuring out the cause of a handle downgrade☆24Updated 2 years ago
 - Documenting system information classes and their uses☆56Updated 4 years ago
 - A sample on how to inject a DLL from a kernel driver☆62Updated 9 years ago
 - Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆41Updated 5 years ago
 - x64 syscall caller in C++.☆92Updated 7 years ago
 - Global user-mode hooking framework, based on AppInit_DLLs. The goal is to allow you to rapidly develop hooks to inject in an arbitrary pr…☆182Updated 3 years ago
 - Fetch PDB symbols directly from Microsoft's symbol servers☆42Updated last week
 - too busy for that all, furikuri is framework for code protection☆161Updated 6 years ago
 - Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆236Updated 5 years ago