HadesW / mhy_expLinks
Mhy Exp (exploit signed driver)
☆140Updated 3 years ago
Alternatives and similar repositories for mhy_exp
Users that are interested in mhy_exp are comparing it to the libraries listed below
Sorting:
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆177Updated 2 years ago
- shellcode 生成框架☆266Updated 3 years ago
- 隐藏可执行内存☆253Updated 2 months ago
- 无痕注入1☆76Updated 4 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- 内核级别隐藏指定窗口☆316Updated 3 years ago
- 大数字驱动逆向代码☆71Updated last year
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 2 years ago
- 驱动加载器 -> 利用iqvw64e.sys映射驱动☆55Updated 4 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆95Updated 2 years ago
- ☆99Updated 3 years ago
- Win7内核私有符号结构转储☆68Updated 3 years ago
- 过去写的一些Windows安全研究相关代码☆135Updated 6 years ago
- 一些使用过期或者注销证书的技术☆266Updated 6 years ago
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆123Updated last year
- 利用CE的DBK驱动加载未签名驱动☆37Updated last year
- 句柄提权 无视反作弊读写游戏内存 用于分析游戏结构工具☆144Updated 3 years ago
- use python script to fix vmp dump api in ida☆119Updated 4 years ago
- 不使用3环挂钩进行DWM桌面绘制☆81Updated 3 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆99Updated 5 years ago
- 一款64位Exe程序动态追踪执行流程以及保存信息的工具☆47Updated 7 months ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆71Updated 3 years ago
- 使用 Intel 虚拟化特性实现应用层HOOK☆61Updated 4 months ago
- ☆80Updated 3 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆68Updated 3 years ago
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆31Updated 2 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆34Updated last year
- ☆83Updated 4 years ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago