MiroKaku / Nt-ModulesLinks
Collect different versions of Crucial modules.
☆144Updated last year
Alternatives and similar repositories for Nt-Modules
Users that are interested in Nt-Modules are comparing it to the libraries listed below
Sorting:
- ☆125Updated 5 years ago
- Windows Driver Kit Extesion Header (Undoc)☆136Updated 3 years ago
- ☆159Updated 4 years ago
- ☆99Updated 7 years ago
- Hide codes/data in the kernel address space.☆189Updated 4 years ago
- A hypervisor hiding user-mode memory using EPT☆109Updated 7 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆142Updated 4 years ago
- ☆114Updated 5 years ago
- first commit☆63Updated 4 years ago
- Collect various versions of ntoskrnl files☆55Updated last year
- hook msr by amd svm☆123Updated 5 years ago
- the basic version of the ring0 physical memory read/write tool☆88Updated 6 years ago
- ayy debuger☆89Updated last year
- This project migrated to https://github.com/backengineering/llvm-msvc☆144Updated last year
- a monitoring windows driver calls kernel api tools☆115Updated last year
- Page fault hook use ept (Intel Virtualization Technology)☆192Updated 8 years ago
- Easy Anti PatchGuard☆224Updated 4 years ago
- query-pdb is a server-side software for parsing PDB files. The software provides PDB online parsing service.☆158Updated 11 months ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 2 years ago
- ☆139Updated 2 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆151Updated 6 years ago
- ShotHv☆149Updated 3 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆174Updated 2 months ago
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆150Updated last year
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆102Updated 2 months ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆164Updated 11 months ago
- ☆67Updated 6 years ago
- ☆153Updated 5 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- Using C++ STL on Windows kernle development☆90Updated 6 years ago