IDouble / Kernel-Memory-Reading-Writing
π Code to read / write the Process Memory from the Kernel π§
β53Updated 8 months ago
Related projects β
Alternatives and complementary repositories for Kernel-Memory-Reading-Writing
- π Very Simple Template to read / write Process Memory with C++ π§β44Updated 8 months ago
- π§ Simple DLL Injection into a Process with C++ π§β87Updated 8 months ago
- βοΈ Simple Step to Step Tutorials for Disassembling / Code Injection & getting Pointer Addresses π§β30Updated 8 months ago
- π§ Assembly with Linux (Notes, Syscalls, Protection Rings) π§β97Updated 8 months ago
- π· IOTA Arbitrage π· (Live ticker IOTA / Ethereum / Bitcoin) | β https://idouble.github.io/IOTA-Arbitrage ββ42Updated 8 months ago
- Virtual Machine Detection based on the TSC register.β8Updated 5 years ago
- β23Updated last year
- π Knowledge about the topic of x86 assembly & disassembly πβ132Updated 8 months ago
- Tutorials, tools, and more as related to reverse engineering video games.β32Updated 6 years ago
- β82Updated last year
- Currently supports injecting signed/unsigned DLLs in 64-bit processesβ59Updated 4 years ago
- APEX-EACBypass(usermode)β46Updated 5 years ago
- π Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizerβ34Updated 4 years ago
- β121Updated 4 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycallβ114Updated 9 months ago
- Memory Guard Libraryβ11Updated 4 years ago
- A dumper for all the imports stored within a Windows PE (portable executable).β12Updated 2 years ago
- GUI Kernel driver process protect toolβ36Updated 6 years ago
- a more stable & secure read/write virtual memory for kernel mode driversβ161Updated 4 years ago
- Simple handler for bypass battleye in 5 secondsβ11Updated 3 years ago
- β49Updated 2 years ago
- δ»₯εζΉθΏηcheatε ζ Έι俑樑ε,η°ε¨EAC Detected,η°ε¨εεΊζ₯β52Updated 3 years ago
- An imgui window rendered on top of nvidia's overlay with animationsβ61Updated last year
- Bypass WinAPI Hook Using copy functionβ50Updated last year
- Library to manipulate drivers that expose a physical memory read/write primitive.β21Updated last year
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) εΈ¦ηΎει©±ε¨οΌι©±ε¨ηΊ§ε εθ―»εβ19Updated 4 years ago