A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.
☆65Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for EDMapper
Users that are interested in EDMapper are comparing it to the libraries listed below
Sorting:
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆241Jun 6, 2019Updated 6 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆117Jan 21, 2025Updated last year
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- x86/x64 dll injector☆31May 17, 2022Updated 3 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Mar 8, 2020Updated 6 years ago
- Generate SDKs from Unreal Engine games (UE1 - 4 supported).☆13Jan 2, 2022Updated 4 years ago
- ☆185May 5, 2019Updated 6 years ago
- Exploring Windows Internals.☆64Aug 18, 2020Updated 5 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- Module extending manual mapper☆382Mar 28, 2020Updated 5 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Aug 25, 2022Updated 3 years ago
- init☆14Mar 16, 2020Updated 6 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆86Apr 25, 2019Updated 6 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- ☆27Mar 5, 2026Updated 2 weeks ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Aug 28, 2021Updated 4 years ago
- C++ graphics kernel subsystem hook☆562Jan 11, 2021Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- Just my first IOCTL try☆75Jul 9, 2020Updated 5 years ago
- PoC: DX11 overlay over DWM☆155Aug 6, 2020Updated 5 years ago
- ☆224May 10, 2022Updated 3 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Sep 2, 2018Updated 7 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Aug 7, 2020Updated 5 years ago
- ☆14Jul 20, 2023Updated 2 years ago
- PoC HWID spoofer that runs in EFI☆342Dec 26, 2024Updated last year
- fix vmprotect import function used unicorn-engine.☆99Apr 4, 2023Updated 2 years ago
- PoC: make WDA_MONITOR window transparent on screenshot/capture☆101Feb 5, 2020Updated 6 years ago
- Different examples of process hollowing.☆14Jul 17, 2020Updated 5 years ago
- driver manual mapper (outdated/for educational purposes)☆115May 17, 2019Updated 6 years ago
- Utilizes a kernel driver for hooking steams overlay than manual mapping our dll to the games memory. Has a bunch of features like esp and…☆92Feb 6, 2020Updated 6 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆106Sep 7, 2023Updated 2 years ago