Deputation / kernel_sockets_memory
Kernel-based memory hacking framework communicating with a kernel driver via sockets.
☆93Updated 3 years ago
Alternatives and similar repositories for kernel_sockets_memory:
Users that are interested in kernel_sockets_memory are comparing it to the libraries listed below
- ShotHv☆139Updated 3 years ago
- ☆165Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆123Updated 3 years ago
- DWM Overlay without write .text☆79Updated 7 months ago
- A Memory Read And Write the Hide Driver☆66Updated 4 years ago
- ☆132Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- ☆55Updated 2 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆86Updated 3 weeks ago
- ☆68Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆111Updated 3 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆134Updated 3 years ago
- Kernel dwm render☆142Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆41Updated 11 months ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated 2 years ago
- ayy debuger☆89Updated last year
- r/w virtual memory without attach☆167Updated last year
- noob hooking dwm for overlay☆80Updated 4 years ago
- ☆123Updated 4 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆85Updated last year
- ☆157Updated 2 years ago
- InjectDll☆55Updated 6 years ago
- ☆53Updated 2 years ago
- Top level overlay drawing for game cheating using dwm.exe☆44Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆68Updated 3 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆81Updated 6 years ago
- ☆49Updated last year
- Hide codes/data in the kernel address space.☆188Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆82Updated 4 years ago