Deputation / kernel_sockets_memoryLinks
Kernel-based memory hacking framework communicating with a kernel driver via sockets.
☆94Updated 4 years ago
Alternatives and similar repositories for kernel_sockets_memory
Users that are interested in kernel_sockets_memory are comparing it to the libraries listed below
Sorting:
- ☆108Updated 2 years ago
- ☆69Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆128Updated 3 years ago
- noob hooking dwm for overlay☆83Updated 5 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 4 years ago
- A Memory Read And Write the Hide Driver☆72Updated 5 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆77Updated 3 years ago
- ShotHv☆150Updated 3 years ago
- Top level overlay drawing for game cheating using dwm.exe☆47Updated 4 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆113Updated 7 months ago
- Kernel driver that uses Shared memory to communicate with UserMode☆88Updated 6 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆91Updated 6 years ago
- ☆173Updated 3 years ago
- ☆70Updated 4 years ago
- Communication via callback☆73Updated 6 years ago
- ☆144Updated 3 years ago
- ayy debuger☆89Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆54Updated last year
- ☆51Updated 2 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆104Updated 2 years ago
- 不使用3环挂钩进行DWM桌面绘制☆81Updated 4 years ago
- ☆48Updated 5 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 3 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Updated 4 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆115Updated 4 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆85Updated 6 years ago
- ☆103Updated 3 years ago
- PoC: make WDA_MONITOR window transparent on screenshot/capture☆101Updated 5 years ago