☆117Feb 11, 2022Updated 4 years ago
Alternatives and similar repositories for Protect_Process
Users that are interested in Protect_Process are comparing it to the libraries listed below
Sorting:
- ☆74Jan 15, 2022Updated 4 years ago
- ☆174Mar 9, 2022Updated 4 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆118May 29, 2025Updated 9 months ago
- 内核级别隐藏指定窗口☆323Feb 9, 2022Updated 4 years ago
- ☆17Apr 21, 2022Updated 3 years ago
- ☆16Oct 31, 2021Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- base for testing☆187Sep 28, 2024Updated last year
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆638Dec 26, 2024Updated last year
- 从MmPfnData中枚举进程和页目录基址☆208Aug 18, 2023Updated 2 years ago
- kernel to user mode APC injector☆46Mar 19, 2022Updated 4 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- Kill Protected Process Light Process (include av)☆57Sep 15, 2023Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- ☆38Nov 30, 2022Updated 3 years ago
- Enum and Remove Hook in Windows☆52Dec 11, 2025Updated 3 months ago
- 保护进程☆24Apr 4, 2023Updated 2 years ago
- Kernel Inject DLL☆352Mar 21, 2023Updated 3 years ago
- ☆56Nov 21, 2022Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- ☆68Aug 31, 2021Updated 4 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago
- a debugger use vt technology☆355Jun 30, 2022Updated 3 years ago
- ☆193May 1, 2023Updated 2 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆387Jan 29, 2022Updated 4 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆393Jul 6, 2022Updated 3 years ago
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆480Aug 31, 2021Updated 4 years ago
- 之前那份是7600的,每次编译搞得 好麻烦。更新一个VS2017可以直接编译的。☆154Jun 5, 2019Updated 6 years ago
- Kernel LdrLoadDll injector☆264Oct 6, 2018Updated 7 years ago
- Intel learning hypervisor and some extend function☆23Aug 23, 2025Updated 6 months ago
- InfinityHookPro Win7 -> Win11 latest☆553Feb 7, 2023Updated 3 years ago
- r/w virtual memory without attach☆224Oct 19, 2023Updated 2 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- Windows Kernel inject (no module no thread)☆282Nov 11, 2022Updated 3 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆57May 23, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 4 years ago