1401199262 / RemoteCall
☆179Updated 2 years ago
Alternatives and similar repositories for RemoteCall:
Users that are interested in RemoteCall are comparing it to the libraries listed below
- 从MmPfnData中枚举进程和页目录基址☆170Updated last year
- r/w virtual memory without attach☆167Updated last year
- ☆166Updated 3 years ago
- ☆158Updated 2 years ago
- Use RTCore64 to map your driver on windows 11.☆107Updated 2 months ago
- ☆132Updated 2 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆56Updated 6 months ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆212Updated 4 years ago
- Kernel dwm render☆143Updated last year
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆121Updated 10 months ago
- 内核驱动加载/卸载痕迹清理,努力绕过反作弊吧 PiDDBCacheTable and MmLastUnloadedDriver☆148Updated 2 years ago
- ☆200Updated 2 years ago
- Example of reading process memory through kernel special APC☆104Updated 2 years ago
- Windows Kernel inject (no module no thread)☆275Updated 2 years ago
- A Memory Read And Write the Hide Driver☆66Updated 4 years ago
- ShotHv☆141Updated 3 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆135Updated 3 years ago
- Standard Kernel Library for Windows manipulation in C++☆140Updated 5 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆168Updated last year
- VT DEBUGGER☆70Updated 2 years ago
- A perfect driver for game hack☆73Updated 2 months ago
- ☆35Updated 7 months ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆108Updated 2 years ago
- 句柄提权 无视反作弊读写游戏内存 用于分析游戏结构工具☆143Updated 3 years ago
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆94Updated last month
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆140Updated last year
- ☆152Updated 11 months ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated 2 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆87Updated last month
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆112Updated 3 years ago