External Hooking ( Bypass process byte patching checks | injector included )
I wonder if there is a way to throw an external hook on processes without triggering page count checks? Or am I just being silly?
As you can see in the attachment below, the injected dll has the same linear address in the internal process and the target process: Bingo!