CasualX / pelite
Lightweight, memory-safe, zero-allocation library for reading and navigating PE binaries.
☆290Updated last year
Related projects ⓘ
Alternatives and complementary repositories for pelite
- C++ graphics kernel subsystem hook☆476Updated 3 years ago
- Module extending manual mapper☆307Updated 4 years ago
- C++17 PE manualmapper☆248Updated 3 years ago
- Memory hacking library powered by AMD SVM☆293Updated last year
- driver manual mapper (outdated/for educational purposes)☆98Updated 5 years ago
- Hooking kernel functions by abusing alignment☆238Updated 3 years ago
- A library to manipulate physical memory from usermode.☆291Updated last year
- Handle elevation DKOM against ObRegisterCallbacks☆282Updated 6 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆244Updated 4 years ago
- get_module, read/write mem, mouse emulation☆299Updated 4 years ago
- System call hook for Windows 10 20H1☆478Updated 3 years ago
- driver mapper / capcom wrapper☆214Updated 5 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆562Updated 5 years ago
- Manual mapping without creating any threads, with rw only access☆676Updated 5 years ago
- DLL scatter manual mapper☆725Updated 3 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆357Updated 3 years ago
- Kernel mode driver for reading/writing process memory. C/Win32.☆276Updated 6 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆273Updated 8 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆843Updated 4 years ago
- Rendering on external windows via hijacking thread contexts☆378Updated 4 years ago
- ☆159Updated 7 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆505Updated 5 years ago
- x64dbg plugin which removes anti-dumping and obfuscation techniques from the popular FPS game Overwatch.☆240Updated 3 years ago
- Obfuscates all RTTI (Run-time type information) inside a binary☆188Updated 7 years ago
- Lightweight Intel VT-x Hypervisor.☆394Updated last year
- a more stable & secure read/write virtual memory for kernel mode drivers☆160Updated 4 years ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆438Updated 5 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆505Updated 2 years ago
- Reversing EasyAntiCheat.☆517Updated 5 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆218Updated 6 years ago