KernelPanic-OpenSource / Win2K3_NT_driversLinks
Windows Server 2K3 NT 5
☆12Updated 4 years ago
Alternatives and similar repositories for Win2K3_NT_drivers
Users that are interested in Win2K3_NT_drivers are comparing it to the libraries listed below
Sorting:
- bypass CRC☆12Updated 7 years ago
- ☆14Updated 6 years ago
- simply manual map any system image☆18Updated 4 years ago
- Windows Server 2K3 NT 5☆12Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- pdb's function and global vars to offset☆10Updated 2 years ago
- ☆39Updated 5 years ago
- ☆28Updated 8 years ago
- Open Anti Cheat☆27Updated 3 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- Disable threat tracing from the kernel..☆13Updated 3 years ago
- ☆15Updated 5 years ago
- ☆24Updated 6 years ago
- Injector with kernel power☆17Updated 5 years ago
- The driver STL library used by myself☆13Updated 3 years ago
- win32/x64 obfuscate framework☆33Updated 6 years ago
- [POC Detected]Bypass BE Anti Dll Injection (POC/Need Driver)☆17Updated 5 years ago
- Some garbage drivers written for getting started☆66Updated 6 years ago
- Very tiny and selective implementation of STL for Windows NT kernel mode drivers☆18Updated 4 years ago
- eac memory sig maker☆14Updated 4 years ago
- For Example. See Miro's Blog☆30Updated 3 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Updated 6 years ago
- ☆23Updated 5 years ago
- ☆44Updated 7 years ago
- ☆34Updated 2 years ago
- Some crazy PE executables protection kernel driver☆20Updated 5 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Updated 7 years ago
- Not mine. Only for saving☆26Updated 3 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Updated 7 years ago