A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.
☆65Aug 31, 2023Updated 2 years ago
Alternatives and similar repositories for EDMapper
Users that are interested in EDMapper are comparing it to the libraries listed below
Sorting:
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Exploring Windows Internals.☆64Aug 18, 2020Updated 5 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- Generate SDKs from Unreal Engine games (UE1 - 4 supported).☆13Jan 2, 2022Updated 4 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Mar 8, 2020Updated 5 years ago
- An easy to use modern C++14/17 async cross-platform logger which supports custom formatting/patterns, colored output, Unicode, file loggi…☆26May 15, 2020Updated 5 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆87Apr 25, 2019Updated 6 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Jan 21, 2025Updated last year
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Sep 2, 2018Updated 7 years ago
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- ☆185May 5, 2019Updated 6 years ago
- fix vmprotect import function used unicorn-engine.☆99Apr 4, 2023Updated 2 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆242Jun 6, 2019Updated 6 years ago
- Recreation of Lode Runner The Legend Returns☆14Feb 13, 2020Updated 6 years ago
- x86/x64 dll injector☆31May 17, 2022Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Tiny Visual C++ library/example that allows you to inject CoreCLR (the .NET Core Runtime) into the current unmanaged process and execute …☆27Jul 13, 2020Updated 5 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆106Jun 28, 2020Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Jan 2, 2021Updated 5 years ago
- ☆31Oct 1, 2021Updated 4 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Aug 7, 2020Updated 5 years ago
- C++ graphics kernel subsystem hook☆561Jan 11, 2021Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Nov 7, 2019Updated 6 years ago
- ☆25May 2, 2024Updated last year
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago