HadesW / mhy_expLinks
Mhy Exp (exploit signed driver)
☆140Updated 3 years ago
Alternatives and similar repositories for mhy_exp
Users that are interested in mhy_exp are comparing it to the libraries listed below
Sorting:
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆180Updated 3 years ago
- 大数字驱动逆向代码☆74Updated 2 years ago
- 隐藏可执行内存☆264Updated 7 months ago
- 无痕注入1☆76Updated 4 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆85Updated 3 years ago
- 内核级别隐藏指定窗口☆317Updated 3 years ago
- shellcode 生成框架☆284Updated 3 years ago
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆33Updated 2 years ago
- 驱动加载器 -> 利用iqvw64e.sys映射驱动☆56Updated 5 years ago
- 基于sunday算法的内存快速搜索,搜索2GB内存只需1秒☆74Updated 6 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆96Updated 2 years ago
- 一款64位Exe程序动态追踪执行流程以及保存信息的工具☆52Updated last year
- 沙箱测试,测评国内常见沙箱的代码与结论☆104Updated 4 years ago
- 一些使用过期或者注销证书的技术☆287Updated 6 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- 过去写的一些Windows安全研究相关代码☆135Updated 6 years ago
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆132Updated 2 years ago
- IDA高级技巧 API符号自动识别库 IDASignMaker☆143Updated 4 years ago
- 简单安排一下 autochk.sys 这个rootkit☆73Updated 2 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆39Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆76Updated 4 years ago
- sc4cpp is a shellcode framework based on C++☆94Updated 4 years ago
- ☆25Updated 3 years ago
- 使用 Intel 虚拟化特性实现应用层HOOK☆64Updated 3 months ago
- ☆17Updated 3 years ago
- Changes handle's access rights using DKOM with a vulnerable driver☆27Updated 8 years ago
- windwos内核研究与驱动Code☆66Updated 3 years ago
- ☆48Updated last year
- 一个用来做windows内核hook的框架☆184Updated 7 months ago
- 句柄提权 无视反作弊读写游戏内存 用于分析游戏结构工具☆150Updated 4 years ago