IcEy-999 / Kernel-Special-APC-ReadProcessMemoryLinks
Example of reading process memory through kernel special APC
☆110Updated 2 years ago
Alternatives and similar repositories for Kernel-Special-APC-ReadProcessMemory
Users that are interested in Kernel-Special-APC-ReadProcessMemory are comparing it to the libraries listed below
Sorting:
- ☆144Updated 3 years ago
- Use RTCore64 to map your driver on windows 11.☆139Updated 7 months ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆138Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆52Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆76Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆194Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- ☆125Updated 2 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Updated 5 years ago
- ☆156Updated last year
- ☆69Updated 3 years ago
- ☆42Updated last year
- ☆184Updated 2 years ago
- A Memory Read And Write the Hide Driver☆72Updated 5 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆98Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- A library to assist with memory & code protection.☆65Updated last year
- ☆146Updated last year
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆96Updated last year
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 4 years ago
- InfinityHookProMax: Make InfinityHook great great again☆48Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆146Updated 4 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆112Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆108Updated 3 years ago
- r/w virtual memory without attach☆205Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆164Updated 3 years ago
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆44Updated last year
- ☆218Updated 2 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆128Updated 3 years ago
- ☆181Updated 3 years ago