LLLZed / IDTHOOKLinks
IDT HOOK KiPageFault test Modified from: github.com/kanren3/x64-IDT-HOOK
☆16Updated 5 years ago
Alternatives and similar repositories for IDTHOOK
Users that are interested in IDTHOOK are comparing it to the libraries listed below
Sorting:
- detect hypervisor with Nmi Callback☆39Updated 2 years ago
- WinDbg-Samples ExdiGdbSrv fork 修复了一部分Vmware调试的问题☆30Updated 2 years ago
- ☆36Updated 5 years ago
- ☆73Updated 2 years ago
- first commit☆62Updated 4 years ago
- A Simple Example☆22Updated 6 years ago
- The driver STL library used by myself☆13Updated 2 years ago
- ☆47Updated 4 years ago
- ☆26Updated last year
- ☆34Updated 2 years ago
- Windows Kernel nt files - To research windows kernel☆16Updated 5 years ago
- anti cheat drv open source☆18Updated last year
- Register a callback in Kernel from a manually mapped driver☆41Updated 4 years ago
- ☆53Updated 2 years ago
- ☆17Updated 2 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- Windows Kernel Misc☆23Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆74Updated 2 years ago
- A Windows Memory driver for game hacking purposes. Supports manual mapping with BlackBone and PastDSE.☆41Updated 4 years ago
- Communication via callback☆72Updated 5 years ago
- eac memory sig maker☆14Updated 4 years ago
- Not mine. Only for saving☆26Updated 3 years ago
- ☆48Updated 4 years ago
- ☆27Updated 7 years ago
- windows kernel pagehook☆40Updated 2 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
- ☆18Updated 4 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆31Updated 4 years ago
- Top level overlay drawing for game cheating using dwm.exe☆45Updated 3 years ago
- Detect removed thread from PspCidTable.☆74Updated 3 years ago