DragonQuestHero / WindowsKernelPrivateSymbolsDumpLinks
Win7内核私有符号结构转储
☆68Updated 3 years ago
Alternatives and similar repositories for WindowsKernelPrivateSymbolsDump
Users that are interested in WindowsKernelPrivateSymbolsDump are comparing it to the libraries listed below
Sorting:
- 收集常用windows版本内核文件☆33Updated last year
- ☆80Updated 3 years ago
- VT Hook☆45Updated 11 months ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆68Updated 4 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆94Updated 2 years ago
- ☆21Updated 5 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 3 years ago
- Intel Virtualization Technology demo☆66Updated 8 years ago
- ☆83Updated 4 years ago
- ☆42Updated 4 months ago
- ☆53Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 2 years ago
- intel vt-x hypervisor ept☆25Updated 5 years ago
- ☆69Updated 3 years ago
- ☆99Updated 3 years ago
- ☆27Updated last year
- 硬件虚拟化☆29Updated last week
- a monitoring windows driver calls kernel api tools☆103Updated 11 months ago
- Hook system calls, context switches, page faults and more.☆35Updated 5 years ago
- EtwHook for win7-win11;☆20Updated 2 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆98Updated 5 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆29Updated 5 months ago
- ☆110Updated 5 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- Reversing EasyAntiCheat.☆32Updated 6 years ago
- Virtualization Simply Code☆25Updated 3 years ago
- A poc of embedding x64 code into x86 PE file☆19Updated 5 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 3 years ago