DragonQuestHero / WindowsSyscallsExLinks
Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查
☆95Updated 2 years ago
Alternatives and similar repositories for WindowsSyscallsEx
Users that are interested in WindowsSyscallsEx are comparing it to the libraries listed below
Sorting:
- 不使用3环挂钩进行DWM桌面绘制☆81Updated 3 years ago
- ☆80Updated 3 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆138Updated 4 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆68Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆108Updated 3 years ago
- ☆70Updated 3 years ago
- 滥用cow机制进行全局注入☆98Updated 4 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 2 years ago
- a monitoring windows driver calls kernel api tools☆104Updated last year
- VT Hook☆45Updated last year
- ☆138Updated 2 years ago
- ☆53Updated 2 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆99Updated 5 years ago
- A Memory Read And Write the Hide Driver☆69Updated 4 years ago
- ☆112Updated 5 years ago
- 收集常用windows版本内核文件☆34Updated last year
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- ShotHv☆144Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆77Updated 9 months ago
- Example of reading process memory through kernel special APC☆109Updated 2 years ago
- https://githacks.org/Shawick/goodeye.git☆50Updated 4 years ago
- 远程注入无导入函数dll,自动重定位以后内存加载dll☆47Updated 6 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆72Updated 2 years ago
- 驱动加载器 -> 利用iqvw64e.sys映射驱动☆56Updated 4 years ago
- Hide Process☆59Updated 11 months ago
- ☆125Updated 5 years ago
- Win7内核私有符号结构转储☆68Updated 3 years ago
- ☆170Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 5 years ago