AlSch092 / DetectOpenHandles
Code example of detecting open process handles to our process (C/C++, Windows)
☆13Updated 2 months ago
Alternatives and similar repositories for DetectOpenHandles:
Users that are interested in DetectOpenHandles are comparing it to the libraries listed below
- ☆63Updated last year
- page table manipulation to gain physical r/w☆43Updated 8 months ago
- Adopted SRL-6 mouse movement to C++☆30Updated 3 years ago
- Single header code that sets any section's page to No Access☆11Updated 2 years ago
- ☆28Updated last year
- ☆48Updated last year
- Kernel Injector pasted from various different Github repositories.☆20Updated 5 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆49Updated 2 years ago
- A simple MmCopyMemory hook.☆36Updated 2 years ago
- ☆36Updated 11 months ago
- ☆31Updated 2 years ago
- kinda custom data ptr swap communication method☆23Updated last year
- ☆40Updated 3 years ago
- ☆71Updated 2 years ago
- ☆45Updated 2 years ago
- ☆19Updated 2 years ago
- Calling "own" MouseClassServiceCallback☆63Updated 2 years ago
- Extracts eac's driver at runtime without it touching the disk.☆32Updated last year
- Modmap updated to work on Windows 11☆28Updated 3 years ago
- Use GDI in KernelMode☆21Updated 2 years ago
- ☆44Updated 4 years ago
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆53Updated 2 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆24Updated last year
- Kernel Level NMI Callback Blocker☆55Updated 4 months ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated last year
- ☆46Updated 2 years ago
- communicate with kernel using a image on disk☆15Updated 8 months ago