DragonQuestHero / DriverLoaderProLinks
windows kernel deriver loader(pro)
☆47Updated 4 years ago
Alternatives and similar repositories for DriverLoaderPro
Users that are interested in DriverLoaderPro are comparing it to the libraries listed below
Sorting:
- Some garbage drivers written for getting started☆66Updated 5 years ago
- Another method to anti ThreadHideFromDebugger☆36Updated 6 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆82Updated 6 years ago
- force delete runing .exe application file.or delete any locked file☆73Updated 2 years ago
- ☆49Updated 2 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆66Updated 6 years ago
- ☆27Updated 7 years ago
- GUI Kernel driver process protect tool☆38Updated 7 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- using gpuz to load driver☆35Updated 6 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated 2 years ago
- Modify process handle permissions☆60Updated 8 years ago
- BetaShield Windows x86 Ring3 Anticheat v2☆40Updated 8 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆51Updated 4 years ago
- Using C++ STL on Windows kernle development☆90Updated 6 years ago
- APC注入DLL内核层☆24Updated 6 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- Injector with kernel power☆16Updated 4 years ago
- Etw hook 查找窗口相关内核函数 实现窗口保护 适用于Win10☆24Updated last year
- A wrapper class to hide the original calling address of a function☆56Updated 4 years ago
- the basic version of the ring0 physical memory read/write tool☆88Updated 5 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- Process path modification x64☆56Updated 7 years ago
- Communication via callback☆72Updated 5 years ago
- Windows driver including couple different techniques for file removal when regular operation isn't possible.☆70Updated 9 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 7 years ago
- get ntdll syscall index☆12Updated 4 years ago