Cerbersec / HDE64Links
Hacker Disassembler Engine 64 Copyright (c) 2008-2009, Vyacheslav Patkov. * All rights reserved.
☆55Updated 4 years ago
Alternatives and similar repositories for HDE64
Users that are interested in HDE64 are comparing it to the libraries listed below
Sorting:
- ☆74Updated 7 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆141Updated 4 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆61Updated 4 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Updated last year
- ☆127Updated 5 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆97Updated 2 years ago
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Updated 6 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Updated 4 years ago
- Debug Print viewer (user and kernel)☆71Updated last year
- Analyze Windows x64 Kernel Memory Layout☆129Updated 5 years ago
- fix vmprotect import function used unicorn-engine.☆98Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆72Updated 4 years ago
- Static Library For Windows Drivers☆41Updated last month
- Collect various versions of ntoskrnl files☆59Updated 2 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆127Updated 3 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Updated 2 years ago
- A modern, mod independent open source cheat for Enemy Territory☆70Updated last month
- Example Windows Kernel-mode Driver which enumerates running processes.☆59Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 3 years ago
- Based on minhook☆34Updated 2 years ago
- x64 syscall caller in C++.☆93Updated 7 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- 滥用cow机制进行全局注入☆99Updated 5 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆108Updated 6 years ago
- first commit☆64Updated 5 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆145Updated 2 years ago
- StrongOD(anti anti-debug plugin) driver source code.☆126Updated 8 years ago
- ☆156Updated 6 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 4 years ago