hook
API monitoring via return-hijacking thunks; works without information about target function prototypes.
A simple program to hook the current process to identify the manual syscall executions on windows
An open-source x86 / x86-64 hooking library for Windows.
Detours is a software package for monitoring and instrumenting API calls on Windows. It is distributed in source code form.
UnhookMe is an universal Windows API resolver & unhooker addressing problem of invoking unmonitored system calls from within of your Red Teams malware
Project to check which Nt/Zw functions your local EDR is hooking
The functions interception library written on pure C and NativeAPI with UserMode and KernelMode support
RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, it first collects the syscall numbers of the NtOpenFile, NtC…
🔥 ShadowHook is an Android inline hook library which supports thumb, arm32 and arm64.
Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.
A hooking framework for commercial Android emulators (雷电模拟器, NOX, BlueStacks).
A simple wrapper for the minhook-sys library that makes making hooks much more concise
Lightweight ARMv8-A(ARM64, AArch64, Little-Endian) Inline Hook Library for Android C/C++
The Minimalistic x86/x64 API Hooking Library for Windows
hook or replace arbitary linux kernel functions in runtime, supporting arm32, arm64, x86, x86_64
A compact tool for detecting AV/EDR hooks in default Windows libraries.
A linux / android / MacOS hooking framework
Advanced x86/x86-64 hooking library (WIP).
Header-only c++ library for hooking functions.
a lightweight, multi-platform, multi-architecture hook framework.