FiYHer / dxgkrnl_hook_exView external linksLinks
以前改进的cheat内核通信模块,现在EAC Detected,现在发出来
☆55Jul 24, 2021Updated 4 years ago
Alternatives and similar repositories for dxgkrnl_hook_ex
Users that are interested in dxgkrnl_hook_ex are comparing it to the libraries listed below
Sorting:
- 内核驱动加载/卸载痕迹清理,努力绕过反作弊吧 PiDDBCacheTable and MmLastUnloadedDriver☆188Feb 11, 2023Updated 3 years ago
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆183Aug 26, 2022Updated 3 years ago
- force delete runing .exe application file.or delete any locked file☆74Mar 21, 2023Updated 2 years ago
- 句柄提权 无视反作弊读写游戏内存 用于分析游戏结构工具☆150Aug 29, 2021Updated 4 years ago
- 不使用3环挂钩进行DWM桌面绘制☆82Dec 9, 2021Updated 4 years ago
- KNSoft.NDK provides native C/C++ definitions and import libraries for Windows NT.☆20Feb 9, 2026Updated last week
- ☆51Dec 19, 2023Updated 2 years ago
- Win7内核私有符号结构转储☆70Sep 3, 2021Updated 4 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆96May 25, 2021Updated 4 years ago
- A Memory Read And Write the Hide Driver☆72Dec 2, 2020Updated 5 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- InfinityHookPro Win7 -> Win11 latest☆551Feb 7, 2023Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆111Aug 10, 2020Updated 5 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- PoC: DX11 overlay over DWM☆155Aug 6, 2020Updated 5 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- 收集常用windows版本内核文件☆35Aug 16, 2023Updated 2 years ago
- zInjector is a simple tool for injecting dynamic link libraries into arbitrary processes☆24Oct 18, 2023Updated 2 years ago
- ☆36Mar 19, 2019Updated 6 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆342Apr 27, 2020Updated 5 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- ☆70Aug 31, 2021Updated 4 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Jun 24, 2021Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- neat way to detect memory read using nt layer function.☆14Aug 4, 2023Updated 2 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆119Feb 8, 2022Updated 4 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆41Aug 31, 2020Updated 5 years ago
- x64 Kernel Hooks Detection☆24Jan 1, 2017Updated 9 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆154Jun 5, 2019Updated 6 years ago
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆77Feb 9, 2022Updated 4 years ago
- Utilizes a kernel driver for hooking steams overlay than manual mapping our dll to the games memory. Has a bunch of features like esp and…☆92Feb 6, 2020Updated 6 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆98Mar 30, 2023Updated 2 years ago