Maktm / hadesmem
HadesMem is a C++-based memory editing library for Windows based applications, with the goal of providing a safe, generic, powerful, and efficient API.
☆24Updated 7 years ago
Alternatives and similar repositories for hadesmem:
Users that are interested in hadesmem are comparing it to the libraries listed below
- usermode standalone kernel interface☆110Updated 6 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆110Updated 7 years ago
- Manual PE image mapper☆62Updated 11 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- Communication via callback☆72Updated 5 years ago
- x64 syscall caller in C++.☆86Updated 6 years ago
- A sample on how to inject a DLL from a kernel driver☆61Updated 8 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆90Updated last week
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆64Updated 5 years ago
- ☆46Updated 4 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆111Updated 8 years ago
- Windows Driver Kit Extesion Header (Undoc)☆133Updated 3 years ago
- Translates WinDbg "dt" structure dump to a C structure☆127Updated 8 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆54Updated 5 years ago
- Pointer search for any classes using the RTTI feature.☆48Updated 4 years ago
- Modern C++ Networking Library☆34Updated 3 years ago
- ☆94Updated 7 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- A simple library which provides a way to read and write the memory of other processes☆51Updated 6 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆54Updated 3 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆99Updated 4 years ago
- Modify process handle permissions☆59Updated 8 years ago
- Intercepting DeviceControl via WPP☆132Updated 5 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- Disable Driver Callbacks☆102Updated 7 years ago
- ☆48Updated 5 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆75Updated 6 years ago