IcEy-999 / Kernel-Special-APC-ReadProcessMemory
Example of reading process memory through kernel special APC
☆103Updated last year
Alternatives and similar repositories for Kernel-Special-APC-ReadProcessMemory:
Users that are interested in Kernel-Special-APC-ReadProcessMemory are comparing it to the libraries listed below
- ☆128Updated 2 years ago
- ☆122Updated last year
- ☆69Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆117Updated 9 months ago
- Use RTCore64 to map your driver on windows 11.☆103Updated 3 weeks ago
- 从MmPfnData中枚举进程和页目录基址☆160Updated last year
- ☆162Updated 3 years ago
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆88Updated last month
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- ☆33Updated 5 months ago
- 不使用3环挂钩进行DWM桌面绘制☆79Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 2 years ago
- A Memory Read And Write the Hide Driver☆66Updated 4 years ago
- ☆176Updated last year
- r/w virtual memory without attach☆166Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆111Updated 3 years ago
- ☆156Updated 2 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆51Updated 5 months ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆40Updated 10 months ago
- ☆139Updated last year
- A perfect driver for game hack☆67Updated last month
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆137Updated 11 months ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated last year
- ☆198Updated 2 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆209Updated 4 years ago
- ☆152Updated 9 months ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- x64/x86 Hooking through VectoredExceptionHandler (PAGE_GUARD method)☆49Updated last year
- Standard Kernel Library for Windows hacking in C++☆132Updated 3 months ago
- ShotHv☆134Updated 3 years ago