LLLZed / IDTHOOKLinks
IDT HOOK KiPageFault test Modified from: github.com/kanren3/x64-IDT-HOOK
☆16Updated 5 years ago
Alternatives and similar repositories for IDTHOOK
Users that are interested in IDTHOOK are comparing it to the libraries listed below
Sorting:
- detect hypervisor with Nmi Callback☆39Updated 2 years ago
- WinDbg-Samples ExdiGdbSrv fork 修复了一部分Vmware调试的问题☆30Updated 2 years ago
- Kernel Mode c++ STL for windows driver☆8Updated 2 years ago
- first commit☆63Updated 4 years ago
- ☆50Updated 2 years ago
- ☆27Updated 7 years ago
- ☆36Updated 5 years ago
- ☆74Updated 2 years ago
- The driver STL library used by myself☆13Updated 2 years ago
- Not mine. Only for saving☆26Updated 3 years ago
- A Simple Example☆22Updated 6 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- ☆47Updated 4 years ago
- eac memory sig maker☆14Updated 4 years ago
- ☆17Updated 2 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 4 years ago
- Top level overlay drawing for game cheating using dwm.exe☆45Updated 3 years ago
- ☆33Updated 2 years ago
- battleye shellcode☆18Updated 5 years ago
- old bypass☆34Updated 6 years ago
- A Windows Memory driver for game hacking purposes. Supports manual mapping with BlackBone and PastDSE.☆39Updated 4 years ago
- Windows Kernel Misc☆23Updated last year
- anti cheat drv open source☆18Updated last year
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆51Updated 4 years ago
- 对Windbg以Exdi模式下调试windows做一些修复☆15Updated last year
- ☆99Updated 7 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆31Updated 4 years ago
- ☆20Updated 3 years ago
- Register a callback in Kernel from a manually mapped driver☆41Updated 4 years ago
- ☆18Updated 4 years ago