GDI Render in kernelmode
☆10Mar 7, 2020Updated 5 years ago
Alternatives and similar repositories for Kernel-GDI
Users that are interested in Kernel-GDI are comparing it to the libraries listed below
Sorting:
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- spoof page-table-entry nx bit☆10Feb 16, 2022Updated 4 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- Unsigned Kernel Mode Driver that does memory modifications☆12Oct 13, 2022Updated 3 years ago
- x64 Driver written in FASM☆24May 18, 2017Updated 8 years ago
- Anti-Debugging, Anti-Reverse Engineering, and Anti-Dumping Techniques. This project is designed to demonstrate and implement a variety of…☆14Jul 30, 2025Updated 7 months ago
- simple undetect esp☆12Mar 19, 2024Updated last year
- ☆13Aug 24, 2022Updated 3 years ago
- ☆17Dec 18, 2020Updated 5 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- An Internal CS:GO cheat hook. Compile and cheat.☆12Aug 31, 2023Updated 2 years ago
- Compile-Time Calls Obfuscator for C++14+☆52Dec 7, 2023Updated 2 years ago
- Use GDI in KernelMode☆26Oct 1, 2022Updated 3 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- Execute anything in a legit memory region by attacking a windows driver☆20Aug 20, 2023Updated 2 years ago
- Stealing signatures from pe files☆15Apr 1, 2025Updated 11 months ago
- windows kernel deriver loader(pro)☆46Feb 4, 2021Updated 5 years ago
- Scripts for BotOfLegends.com☆20Jan 7, 2015Updated 11 years ago
- ☆24Oct 25, 2022Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- fortnite cheat external that uses efi drivers and is updated☆20Dec 17, 2021Updated 4 years ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆36Jul 2, 2024Updated last year
- ☆27Jun 24, 2022Updated 3 years ago
- ☆29Mar 9, 2024Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆28Aug 3, 2024Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆55May 16, 2024Updated last year
- Game reverse drawing algorithm☆23Jul 17, 2022Updated 3 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆28Nov 6, 2023Updated 2 years ago
- OBME: OBfuscated MEmory. Fast and easy to use tool in simple C++ to avoid memory cheating by scanning (searching). See igameguardian, "Ch…☆33Jun 16, 2017Updated 8 years ago
- a monitoring windows driver calls kernel api tools☆128Jul 5, 2024Updated last year
- Kernel dwm render☆168Oct 10, 2023Updated 2 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- An other Detected & Pasted driver☆24Jun 30, 2022Updated 3 years ago
- Windows Kernel Misc☆25Sep 3, 2023Updated 2 years ago
- ☆183May 20, 2022Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Apr 9, 2023Updated 2 years ago
- Hook system calls, context switches, page faults and more.☆34Jul 25, 2019Updated 6 years ago
- 这是一个 fps 单机游戏逆向练习项目,使用 imgui 绘制。(This is a reverse practice project for fps single player games, drawn using imgui.)☆13Sep 5, 2023Updated 2 years ago