DragonQuestHero / WindowsKernelPrivateSymbolsDumpLinks
Win7内核私有符号结构转储
☆69Updated 4 years ago
Alternatives and similar repositories for WindowsKernelPrivateSymbolsDump
Users that are interested in WindowsKernelPrivateSymbolsDump are comparing it to the libraries listed below
Sorting:
- 收集常用windows版本内核文件☆35Updated 2 years ago
- ☆47Updated 11 months ago
- ☆23Updated 6 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆97Updated 2 years ago
- ☆81Updated 3 years ago
- intel vt-x hypervisor ept☆25Updated 5 years ago
- ☆54Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出 来给更多想学VT的人参考...☆71Updated 4 years ago
- VT Hook☆50Updated last year
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Updated 4 years ago
- For Example. See Miro's Blog☆30Updated 3 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 4 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆100Updated 5 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 3 years ago
- ☆90Updated 5 years ago
- A poc of embedding x64 code into x86 PE file☆20Updated 6 years ago
- ☆102Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆81Updated 4 years ago
- a frame of amd-v svm nest☆53Updated 5 years ago
- Reversing EasyAntiCheat.☆32Updated 6 years ago
- ☆116Updated 6 years ago
- 使用vt进行无痕hook,支持r3☆61Updated 6 years ago
- Intel Virtualization Technology demo☆70Updated 9 years ago
- Process path modification x64☆59Updated 7 years ago
- Hook system calls, context switches, page faults and more.☆34Updated 6 years ago
- ☆48Updated 7 years ago
- the basic version of the ring0 physical memory read/write tool☆91Updated 6 years ago
- Open Anti Cheat☆27Updated 3 years ago
- 大部分常见windows内核文件合集 下方链接里有更多更全面的☆16Updated 2 years ago