Cerbersec / HDE64Links
Hacker Disassembler Engine 64 Copyright (c) 2008-2009, Vyacheslav Patkov. * All rights reserved.
☆54Updated 4 years ago
Alternatives and similar repositories for HDE64
Users that are interested in HDE64 are comparing it to the libraries listed below
Sorting:
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Updated 11 months ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆60Updated 4 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆141Updated 4 years ago
- ☆74Updated 7 years ago
- ☆126Updated 5 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆97Updated 2 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆145Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆71Updated 4 years ago
- c++ implementation of windows heavens gate☆70Updated 4 years ago
- Debug Print viewer (user and kernel)☆69Updated last year
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 3 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- DSE bypass using a leaked cert and adjusting the current clock.☆152Updated 3 months ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆123Updated 3 years ago
- Exploit MsIo vulnerable driver☆121Updated 4 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆131Updated 2 years ago
- A modern, mod independent open source cheat for Enemy Territory☆70Updated last month
- Analyze Windows x64 Kernel Memory Layout☆128Updated 5 years ago
- 滥用cow机制进行全局注入☆98Updated 5 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆58Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Updated 6 years ago
- Collect various versions of ntoskrnl files☆59Updated 2 years ago
- ☆51Updated 5 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Updated 4 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆178Updated 7 months ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 4 years ago
- InfinityHookProMax: Make InfinityHook great great again☆49Updated 2 years ago