IDouble / Kernel-Memory-Reading-WritingLinks
π Code to read / write the Process Memory from the Kernel π§
β77Updated last year
Alternatives and similar repositories for Kernel-Memory-Reading-Writing
Users that are interested in Kernel-Memory-Reading-Writing are comparing it to the libraries listed below
Sorting:
- π Very Simple Template to read / write Process Memory with C++ π§β63Updated last year
- π§ Simple DLL Injection into a Process with C++ π§β116Updated last year
- βοΈ Simple Step to Step Tutorials for Disassembling / Code Injection & getting Pointer Addresses π§β50Updated last year
- π§ Assembly with Linux (Notes, Syscalls, Protection Rings) π§β122Updated last year
- π Learning paper.js & doing Experiments with it πβ24Updated last year
- π₯ A simple Chat Server in Java, implemented with the Observer pattern π₯β30Updated last year
- i stole this from some guys private repo on githubβ56Updated 3 years ago
- β27Updated 7 years ago
- Mapping your code on a 0x1000 size pageβ72Updated 3 years ago
- mouseclassservicecallback detection via hookβ50Updated 3 years ago
- a minimalistic windows hypervisor for amd processorsβ108Updated 2 years ago
- driver that communicates using a shared sectionβ62Updated 3 months ago
- π Knowledge about the topic of x86 assembly & disassembly πβ161Updated last year
- cr3 shuffle driverβ48Updated last year
- Unsigned Kernel Mode Driver that does memory modificationsβ11Updated 2 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisyβ84Updated 4 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weaknessβ52Updated 5 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driverβ71Updated 2 years ago
- ε°ι©±ε¨ζ ε°ε°δΌθ―η©Ίι΄β35Updated 2 years ago
- Hardware IDβ48Updated 3 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inteβ¦β95Updated 2 years ago
- π± A handy Calculator for Trinary operations π± | β https://play.google.com/store/apps/details?id=com.trinarycalculator.ayidouble.trinaryβ¦β27Updated last year
- Modify process handle permissionsβ60Updated 8 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly calledβ82Updated 3 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processesβ63Updated 4 years ago
- UM-KM Communication using registry callbacksβ39Updated 5 years ago
- Old way for blocking NMI interruptsβ26Updated 2 years ago
- β36Updated 5 years ago
- Discarded Section Manual Mapβ68Updated 5 years ago
- Extracts eac's driver at runtime without it touching the disk.β33Updated 2 months ago