Indirect Syscall invocation via thread hijacking
-
Updated
May 5, 2023 - C
Indirect Syscall invocation via thread hijacking
NTAPI hook bypass with (semi) legit stack trace
Dynamic Syscall Dispatch & Execution Framework, Bypassing Usermode hooks & Kernel protections (Win10/11x64)
CODM-Hook-Bypass
Fast, Hookless, IAT-Free API Virtualization Layer (Win10/11)
bgmi mod menu hook bypass code
Add a description, image, and links to the hook-bypass topic page so that developers can more easily learn about it.
To associate your repository with the hook-bypass topic, visit your repo's landing page and select "manage topics."