DragonQuestHero / WindowsSyscallsEx
Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查
☆93Updated 2 years ago
Alternatives and similar repositories for WindowsSyscallsEx:
Users that are interested in WindowsSyscallsEx are comparing it to the libraries listed below
- ☆80Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 3 years ago
- ☆68Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆68Updated 3 years ago
- VT Hook☆46Updated 9 months ago
- ☆132Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆106Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆134Updated 3 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆56Updated 6 months ago
- ☆52Updated 2 years ago
- ☆165Updated 3 years ago
- 远程注入无导入函数dll,自动重定位以后内存加载dll☆45Updated 5 years ago
- ☆110Updated 5 years ago
- ShotHv☆139Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆105Updated 2 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- ☆35Updated 7 months ago
- Example of reading process memory through kernel special APC☆103Updated 2 years ago
- 滥用cow机制进行全局注入☆97Updated 4 years ago
- 从MmPfnData中枚举进程和页目录基址☆167Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- Process path modification x64☆54Updated 6 years ago
- 收集常用windows版本内核文件☆31Updated last year
- ☆179Updated last year
- the basic version of the ring0 physical memory read/write tool☆89Updated 5 years ago
- ☆27Updated last year
- A Memory Read And Write the Hide Driver☆66Updated 4 years ago
- InjectDll☆55Updated 6 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆41Updated 11 months ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago