0xenia / rememLinks
remem is a C++ library designed for memory manipulation, function calling, and pattern scanning. It supports various calling conventions, memory reading/writing with offset handling.
☆11Updated last year
Alternatives and similar repositories for remem
Users that are interested in remem are comparing it to the libraries listed below
Sorting:
- eac memory sig maker☆14Updated 4 years ago
- ☆34Updated 2 years ago
- ☆18Updated 4 years ago
- ☆23Updated 2 years ago
- A simple present scene, kernel allocation injector.☆25Updated 3 years ago
- direct systemcalls with a modern c++20 interface.☆44Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Updated 3 years ago
- BitBlt color aimbot☆16Updated 6 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆25Updated 2 years ago
- ☆15Updated 4 years ago
- A Simple Example☆22Updated 6 years ago
- ☆15Updated 4 years ago
- Libraries written in inline assembly☆19Updated 2 years ago
- Logging library for kernel drivers written for the Windows NT operating system.☆19Updated last month
- ☆46Updated 6 years ago
- simply manual map any system image☆18Updated 4 years ago
- ☆14Updated 4 years ago
- Not mine. Only for saving☆26Updated 3 years ago
- x64 assembler library☆31Updated last year
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- detect hypervisor with Nmi Callback☆39Updated 2 years ago
- ☆28Updated 3 years ago
- Memory Guard Library☆11Updated 4 years ago
- ☆18Updated 3 years ago
- Stealing signatures from pe files☆17Updated 4 months ago
- ☆21Updated 3 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- POC kernel driver with hidden system thread☆14Updated last year
- ☆17Updated 4 years ago
- Leveraging Platform Trust Technology (PTT) to defeat Driver Signing Enforcement (DSE) to run Kernel Drivers (KMDF) with Secure Boot Enabl…☆12Updated 3 years ago