HARM4Y / KarlannLinks
It's a kernel-based keylogger for Windows x86/x64.
☆139Updated 2 years ago
Alternatives and similar repositories for Karlann
Users that are interested in Karlann are comparing it to the libraries listed below
Sorting:
- Radical Windows ARK☆234Updated last month
- 内核级别隐藏指定窗口☆309Updated 3 years ago
- ☆202Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆136Updated 3 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆71Updated 7 months ago
- ☆179Updated 2 years ago
- shellcode 生成框架☆264Updated 3 years ago
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆176Updated 2 years ago
- 远程注入无导入函数dll,自动重定位以后内存加载dll☆45Updated 6 years ago
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- ☆52Updated 2 years ago
- ☆166Updated 3 years ago
- ShotHv☆143Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆216Updated 4 years ago
- 隐藏可执行内存☆252Updated last month
- Analyze Windows x64 Kernel Memory Layout☆121Updated 4 years ago
- 一个用来做windows内核hook的框架☆150Updated last month
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆95Updated last week
- 驱动加载器 -> 利用iqvw64e.sys映射驱动☆55Updated 4 years ago
- 大数字驱动逆向代码☆71Updated last year
- 从MmPfnData中枚举进程和页目录基址☆176Updated last year
- r/w virtual memory without attach☆175Updated last year
- ☆80Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆108Updated 2 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆94Updated 2 years ago
- 一些使用过期或者注销证书的技术☆261Updated 6 years ago
- 句柄提权 无视反作弊读写游戏内存 用于分析游戏结构工具☆144Updated 3 years ago
- 一个windows内核驱动分析框架,对内核所有导出函数进行挂钩监控☆48Updated 3 weeks ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago