GitHub / keowu / InstrumentationCallbackToolKit
A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using InstrumentationCallback.
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/keowu%2FInstrumentationCallbackToolKit
PURL: pkg:github/keowu/InstrumentationCallbackToolKit
Stars: 31
Forks: 11
Open issues: 0
License: gpl-3.0
Language: C++
Size: 134 KB
Dependencies parsed at: Pending
Created at: almost 2 years ago
Updated at: 3 months ago
Pushed at: almost 2 years ago
Last synced at: about 2 months ago
Topics: anticheat, instrumentation, malware, nirvana, ntoskrnl, reverse-engineering, syscall, windows