SetWinEventHook Sample
☆50Sep 23, 2023Updated 2 years ago
Alternatives and similar repositories for WinEventHooks
Users that are interested in WinEventHooks are comparing it to the libraries listed below
Sorting:
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆47Aug 23, 2023Updated 2 years ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated last month
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆141Feb 27, 2023Updated 3 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- Native Powers Talk demos☆15Jan 30, 2026Updated last month
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆28Aug 19, 2024Updated last year
- IAT-Obfuscation to make static analysis of executable harder.☆44Sep 6, 2021Updated 4 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆28Nov 6, 2023Updated 2 years ago
- base on winHttp to develep download☆12Apr 14, 2018Updated 7 years ago
- Files for http://deniable.org/windows/windows-callbacks☆26Jul 9, 2020Updated 5 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆54Oct 19, 2023Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Jan 1, 2023Updated 3 years ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- Windows x64 kernel mode rootkit process hollowing POC.☆189Jun 30, 2023Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Feb 7, 2022Updated 4 years ago
- ETWProcessMon2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detecti…☆319Mar 20, 2024Updated last year
- A small x64 library to load dll's into memory.☆457Nov 6, 2023Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65May 1, 2023Updated 2 years ago
- Call NtCreateUserProcess directly as normal.☆77May 17, 2022Updated 3 years ago
- PE loader for @carrot_c4k3's GameScript Xbox One exploit☆79Jul 20, 2025Updated 7 months ago
- Resolve DOS MZ executable symbols at runtime☆96Nov 12, 2021Updated 4 years ago
- ☆208Apr 5, 2022Updated 3 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- Repo that holds random POCs☆52Jan 8, 2024Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Simple tool to dump/hide services in services.exe process.☆14Apr 22, 2022Updated 3 years ago
- Small class to help perform syscalls.☆21May 15, 2025Updated 9 months ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆120May 22, 2025Updated 9 months ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Process Injection using Thread Name☆299Apr 18, 2025Updated 10 months ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- Inject unsigned DLL into Protected Process Light (PPL)☆40May 8, 2025Updated 9 months ago