Can Bölük

@_can1357

Security researcher and reverse engineer; mostly interested in Windows kernel development and low-level programming. Founder of .

The Netherlands
Vrijeme pridruživanja: lipanj 2012.

Medijski sadržaj

  1. 18. stu 2019.

    After an additional week of work, ExHook is finally live. ExHook is a standalone project utilizing ByePgLib allowing you to hook all kernel-to-user exits (SYSCALL or any interrupt) bypassing PatchGuard. Enjoy!

    Prikaži ovu nit
  2. 20. lis 2019.

    Just pushed a SEH module to ByePg, letting you use SEH in manual mapped drivers effectively bypassing another PatchGuard protected mechanism as it protects PsInvertedFunctionTable. System-call hooks coming Soon™.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·