DragonQuestHero / WindowsKernelPrivateSymbolsDumpLinks
Win7内核私有符号结构转储
☆67Updated 3 years ago
Alternatives and similar repositories for WindowsKernelPrivateSymbolsDump
Users that are interested in WindowsKernelPrivateSymbolsDump are comparing it to the libraries listed below
Sorting:
- 收集常用windows版本内核文件☆32Updated last year
- ☆80Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆94Updated 2 years ago
- VT Hook☆46Updated 10 months ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆108Updated 2 years ago
- ☆42Updated 3 months ago
- ☆21Updated 5 years ago
- intel vt-x hypervisor ept☆25Updated 5 years ago
- A poc of embedding x64 code into x86 PE file☆18Updated 5 years ago
- Intel Virtualization Technology demo☆66Updated 8 years ago
- ☆81Updated 4 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆68Updated 4 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆29Updated 5 months ago
- Hook NtDeviceIoControlFile with PatchGuard☆106Updated 3 years ago
- ☆99Updated 3 years ago
- ☆68Updated 3 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 3 years ago
- Hook system calls, context switches, page faults and more.☆35Updated 5 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 3 years ago
- ☆52Updated 2 years ago
- ☆27Updated last year
- ida提取特征码脚本☆56Updated 5 years ago
- ☆33Updated 2 years ago
- Call NtCreateUserProcess directly as normal.☆71Updated 3 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- Virtualization Simply Code☆23Updated 3 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- ☆110Updated 5 years ago
- 使用 Intel 虚拟化特性实现应用层HOOK☆61Updated 3 months ago