DragonQuestHero / WindowsKernelPrivateSymbolsDumpLinks
Win7内核私有符号结构转储
☆68Updated 4 years ago
Alternatives and similar repositories for WindowsKernelPrivateSymbolsDump
Users that are interested in WindowsKernelPrivateSymbolsDump are comparing it to the libraries listed below
Sorting:
- 收集常用windows版本内核文件☆34Updated 2 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆96Updated 2 years ago
- ☆23Updated 6 years ago
- ☆47Updated 10 months ago
- ☆81Updated 3 years ago
- intel vt-x hypervisor ept☆24Updated 5 years ago
- VT Hook☆49Updated last year
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆100Updated 5 years ago
- ☆53Updated 3 years ago
- For Example. See Miro's Blog☆30Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 4 years ago
- a frame of amd-v svm nest☆53Updated 5 years ago
- Process path modification x64☆59Updated 7 years ago
- Intel Virtualization Technology demo☆69Updated 9 years ago
- Hook system calls, context switches, page faults and more.☆33Updated 6 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆108Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 4 years ago
- ☆101Updated 3 years ago
- Free(or force?)file and delete it☆11Updated 6 years ago
- A poc of embedding x64 code into x86 PE file☆20Updated 6 years ago
- ☆90Updated 4 years ago
- Reversing EasyAntiCheat.☆32Updated 6 years ago
- 大部分常见windows内核文件合集 下方链接里有更多更全面的☆16Updated 2 years ago
- Open Anti Cheat☆27Updated 3 years ago
- ☆115Updated 6 years ago
- If you are cracking a mfc program, you may find this useful.☆72Updated 12 years ago
- https://githacks.org/Shawick/goodeye.git☆52Updated 5 years ago