FiYHer / dxgkrnl_hook_exLinks
以前改进的cheat内核通信模块,现在EAC Detected,现在发出来
☆51Updated 4 years ago
Alternatives and similar repositories for dxgkrnl_hook_ex
Users that are interested in dxgkrnl_hook_ex are comparing it to the libraries listed below
Sorting:
- 不使用3环挂钩进行DWM桌面绘制☆79Updated 3 years ago
- ☆69Updated 3 years ago
- https://githacks.org/Shawick/goodeye.git☆49Updated 5 years ago
- noob hooking dwm for overlay☆81Updated 4 years ago
- ☆34Updated 5 years ago
- ☆18Updated 3 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆74Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- ☆47Updated 4 years ago
- Top level overlay drawing for game cheating using dwm.exe☆45Updated 3 years ago
- ☆51Updated last year
- ☆79Updated 3 years ago
- ☆53Updated 2 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 7 years ago
- ☆15Updated 2 years ago
- APEX-EACBypass(usermode)☆47Updated 6 years ago
- APC注入DLL内核层☆23Updated 6 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- Windows Kernel Misc☆23Updated 2 years ago
- VT Hook☆47Updated last year
- first commit☆62Updated 4 years ago
- ☆23Updated 2 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago
- ☆39Updated 3 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆94Updated 4 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆98Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 3 years ago