Air14 / SymbolicAccessLinks
Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB
☆96Updated last month
Alternatives and similar repositories for SymbolicAccess
Users that are interested in SymbolicAccess are comparing it to the libraries listed below
Sorting:
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆159Updated 10 months ago
- ☆138Updated 2 years ago
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆145Updated last year
- ☆170Updated 3 years ago
- ShotHv☆144Updated 3 years ago
- ☆45Updated 2 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆72Updated 2 years ago
- 一个简单的驱动☆59Updated last year
- a monitoring windows driver calls kernel api tools☆104Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆45Updated last year
- ☆37Updated 9 months ago
- ☆57Updated 2 years ago
- Kernel dwm render☆154Updated last year
- This is an extension to InfinityHookPro to support physical machine environments. (Win7 -> Win11 latest)☆34Updated 2 years ago
- noob hooking dwm for overlay☆80Updated 4 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆124Updated 3 years ago
- first commit☆62Updated 4 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆102Updated this week
- ☆70Updated 3 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆129Updated last year
- ☆170Updated 3 years ago
- ☆212Updated 2 years ago
- ☆98Updated 3 years ago
- ☆184Updated 2 years ago
- VT DEBUGGER☆75Updated 2 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆75Updated 9 months ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆93Updated 4 years ago
- Example driver on how to use SKLib☆53Updated 7 months ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 2 years ago
- PTE hook☆27Updated last year