Air14 / SymbolicAccessLinks
Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB
☆105Updated 4 months ago
Alternatives and similar repositories for SymbolicAccess
Users that are interested in SymbolicAccess are comparing it to the libraries listed below
Sorting:
- ☆138Updated 2 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆162Updated last year
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆150Updated last year
- ShotHv☆149Updated 3 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆52Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆75Updated 2 years ago
- a monitoring windows driver calls kernel api tools☆121Updated last year
- noob hooking dwm for overlay☆82Updated 4 years ago
- ☆171Updated 3 years ago
- ☆60Updated 2 years ago
- ☆38Updated last year
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆90Updated 11 months ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆149Updated 2 years ago
- This is an extension to InfinityHookPro to support physical machine environments. (Win7 -> Win11 latest)☆34Updated 2 years ago
- ☆60Updated 3 years ago
- ☆178Updated 3 years ago
- Kernel dwm render☆161Updated last year
- A Memory Read And Write the Hide Driver☆71Updated 4 years ago
- ☆186Updated 2 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆127Updated 3 years ago
- VT DEBUGGER☆81Updated 2 years ago
- ☆70Updated 3 years ago
- ☆99Updated 3 years ago
- query-pdb is a server-side software for parsing PDB files. The software provides PDB online parsing service.☆159Updated last week
- DWM Overlay without write .text☆99Updated last year
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆115Updated last month
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 3 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆94Updated 4 years ago
- A .data pointer hook with communication in windows 11☆33Updated 8 months ago
- 从MmPfnData中枚举进程和页目录基址☆187Updated 2 years ago