Skip to content
View hwbp's full-sized avatar
  • NSA
  • Memory
  • Joined Dec 7, 2025

Block or report hwbp

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
hwbp/README.md

Tech Stack

  • Malware Dev for 5 years, i have experience with reverse engineering and low level.

C C++ ASM

Popular repositories Loading

  1. CLR-Unhook CLR-Unhook Public

    Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan in-memory .NET assembly loads. This tool unhooks that functi…

    C++ 190 23

  2. LazyHook LazyHook Public

    Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.

    C++ 116 23

  3. NTDLL-Unhook NTDLL-Unhook Public

    proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.

    C++ 45 4

  4. hwbp hwbp Public

    About me...

    1