ORCx41/KnownDllUnhook

Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs

Cbypassedr
This is stars and forks stats for /ORCx41/KnownDllUnhook repository. As of 03 May, 2024 this repository has 270 stars and 37 forks.

KnownDllUnhook: Replace the .txt section of the current loaded modules from \KnownDlls\ to do api unhooking How Does it Work: first, it loops through the loaded dlls check if the name of the loaded dll is found in \KnownDlls\ dir if found, the dll will be mapped to the current process then, some calculations happen ( to get the address of the .txt section of the current dll & it's size ) change the memory permissions on current dll's .txt to 'PAGE_EXECUTE_WRITECOPY' replace the .txt section from...
Read on GithubGithub Stats Page
repotechsstarsweeklyforksweekly
X0rg/CPU-XCC++Assembly1.7k01140
intel/xessCHLSL3680300
Ascotbe/KernelhubCC#C++2.7k06660
vxunderground/VXUG-PapersCGoC++95102100
skiselkov/BetterPushbackCCCMakeShell48101330
nifanfa/MOOSC#CC++9480740
Cysharp/MemoryPackC#TypeScriptOther2.1k01270
DGP-Studio/Snap.HutaoC#2k01160
pavelsavara/dotnet-wasm-todo-mvcC#CSSJavaScript550220
8212369/WPRC#2120120