☆193May 1, 2023Updated 2 years ago
Alternatives and similar repositories for RemoteCall
Users that are interested in RemoteCall are comparing it to the libraries listed below
Sorting:
- 从MmPfnData中枚举进程和页目录基址☆208Aug 18, 2023Updated 2 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- ☆23May 8, 2023Updated 2 years ago
- ☆144Dec 10, 2022Updated 3 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- r/w virtual memory without attach☆224Oct 19, 2023Updated 2 years ago
- ☆225Mar 11, 2023Updated 3 years ago
- Example of reading process memory through kernel special APC☆111Apr 21, 2023Updated 2 years ago
- ☆309May 11, 2023Updated 2 years ago
- ☆183May 20, 2022Updated 3 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆177Sep 13, 2024Updated last year
- ☆158May 21, 2024Updated last year
- ☆174Mar 9, 2022Updated 4 years ago
- ☆132Sep 24, 2023Updated 2 years ago
- query-pdb is a server-side software for parsing PDB files. The software provides PDB online parsing service.☆167Oct 27, 2025Updated 4 months ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆118May 29, 2025Updated 9 months ago
- a monitoring windows driver calls kernel api tools☆129Jul 5, 2024Updated last year
- ☆34Apr 11, 2023Updated 2 years ago
- Windows Kernel inject (no module no thread)☆282Nov 11, 2022Updated 3 years ago
- Kernel dwm render☆170Oct 10, 2023Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- Windows Kernel Misc☆25Sep 3, 2023Updated 2 years ago
- 将shellcode注入dwm.exe以进行屏幕截取☆362Mar 22, 2022Updated 3 years ago
- ☆225Feb 21, 2023Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆213Dec 16, 2022Updated 3 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆554Nov 12, 2022Updated 3 years ago
- base for testing☆187Sep 28, 2024Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Oct 10, 2022Updated 3 years ago
- ☆17Dec 18, 2022Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆387Jan 29, 2022Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- Windows Anti-Rootkit Tool☆546Dec 31, 2025Updated 2 months ago
- 不使用3环挂钩进行DWM桌面绘制☆83Dec 9, 2021Updated 4 years ago
- Lightweight Intel VT-x Hypervisor.☆669Dec 17, 2024Updated last year
- ShotHv☆155Mar 8, 2022Updated 4 years ago