☆49Feb 21, 2022Updated 4 years ago
Alternatives and similar repositories for Remap
Users that are interested in Remap are comparing it to the libraries listed below
Sorting:
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- ☆24May 17, 2022Updated 3 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- ☆20May 17, 2022Updated 3 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- ☆12Jun 30, 2019Updated 6 years ago
- ☆12Oct 12, 2021Updated 4 years ago
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- page table manipulation to gain physical r/w☆43May 7, 2024Updated last year
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- ☆158May 21, 2024Updated last year
- ☆17Apr 21, 2022Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- Rendering on external windows via hijacking thread contexts, with notes on ValidateHwnd☆14Jul 9, 2020Updated 5 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- https://githacks.org/Shawick/goodeye.git☆52Sep 2, 2020Updated 5 years ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago
- This is a simple project of a driver + usermode.☆168Jan 31, 2022Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Apr 17, 2021Updated 4 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- ☆47Nov 26, 2020Updated 5 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆104Aug 3, 2023Updated 2 years ago
- ☆23May 8, 2023Updated 2 years ago
- ☆18Dec 4, 2020Updated 5 years ago
- base for testing☆186Sep 28, 2024Updated last year
- A Windows Memory driver for game hacking purposes. Supports manual mapping with BlackBone and PastDSE.☆43Apr 23, 2021Updated 4 years ago
- Not mine, just saved☆14Nov 12, 2023Updated 2 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆57May 23, 2022Updated 3 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆26Apr 24, 2022Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago