CodeCrackerSND / MemoryHackerLinks
MemoryHacker is a tool which can search for values on the target process!
☆22Updated 8 years ago
Alternatives and similar repositories for MemoryHacker
Users that are interested in MemoryHacker are comparing it to the libraries listed below
Sorting:
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Updated 7 years ago
- ☆32Updated 6 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- ☆23Updated 7 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- ☆21Updated 6 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆28Updated 7 years ago
- Map memory to user space and manipulate user memory, using capmon☆23Updated 6 years ago
- ☆27Updated 6 years ago
- 常用代码类☆13Updated 11 years ago
- Branch based windows debugger☆21Updated 5 years ago
- You don't need install any wdk for development kernel driver☆24Updated 6 years ago
- lz77win sources!lz77 is the compression software for the windows platform.☆24Updated 6 years ago
- ☆33Updated 4 years ago
- Reverse engineered vmware workstation code to aid in kernel debugging.☆14Updated 9 years ago
- Windows NDIS 6.3 Protocol Driver that provides usermode access to an IsoSwitch or CrowdSwitch☆10Updated 7 years ago
- Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc☆16Updated 6 years ago
- some classes which can help me to program kernel driver in Windows.☆16Updated 7 years ago
- vmp3.2授权分析☆29Updated 6 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- ☆35Updated 9 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 11 years ago
- by others☆38Updated 7 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆46Updated 8 years ago
- The demo on Windows☆21Updated 9 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- Enables x64 applications to call any x86 function through a special function called X86Call☆17Updated 8 years ago
- ☆13Updated 10 months ago
- Kernel-mode file scanner☆18Updated 6 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆23Updated 10 years ago