DragonQuestHero / Kernel-Force-Delete
force delete runing .exe application file.or delete any locked file
☆70Updated last year
Alternatives and similar repositories for Kernel-Force-Delete:
Users that are interested in Kernel-Force-Delete are comparing it to the libraries listed below
- windows kernel deriver loader(pro)☆46Updated 4 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- ☆30Updated 4 years ago
- Windows driver including couple different techniques for file removal when regular operation isn't possible.☆67Updated 9 years ago
- ☆36Updated 7 years ago
- APC注入DLL内核层☆22Updated 6 years ago
- Using C++ STL on Windows kernle development☆88Updated 5 years ago
- GUI Kernel driver process protect tool☆36Updated 6 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆52Updated 3 years ago
- ☆53Updated 2 years ago
- Process path modification x64☆53Updated 6 years ago
- ☆47Updated 2 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆81Updated 5 years ago
- InfinityHookProMax: Make InfinityHook great great again☆42Updated last year
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆42Updated last year
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆74Updated 3 months ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 6 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆64Updated 5 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆80Updated last year
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Simulate SendInput with ClassService☆31Updated 6 years ago
- ☆68Updated 2 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆75Updated 6 years ago
- ☆46Updated 4 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆55Updated 2 years ago
- Manual PE image mapper☆62Updated 11 years ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago