MiroKaku / Nt-Modules
Collect different versions of Crucial modules.
☆130Updated 9 months ago
Alternatives and similar repositories for Nt-Modules:
Users that are interested in Nt-Modules are comparing it to the libraries listed below
- ☆123Updated 4 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- ☆96Updated 7 years ago
- Hide codes/data in the kernel address space.☆188Updated 3 years ago
- ☆157Updated 4 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆134Updated 3 years ago
- ayy debuger☆89Updated last year
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆106Updated 2 years ago
- ☆110Updated 5 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆155Updated 2 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 5 years ago
- hook msr by amd svm☆120Updated 5 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆140Updated last year
- ☆131Updated 2 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆183Updated 8 years ago
- A hypervisor hiding user-mode memory using EPT☆106Updated 7 years ago
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆139Updated last year
- ☆164Updated 3 years ago
- first commit☆60Updated 4 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆149Updated 5 years ago
- Easy Anti PatchGuard☆214Updated 4 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆84Updated 2 weeks ago
- ShotHv☆137Updated 3 years ago
- 🪝 Different aproaches to detecting EPT hooks☆104Updated 2 years ago
- ☆152Updated 5 years ago
- Intercepting DeviceControl via WPP☆133Updated 5 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆112Updated 3 years ago
- An Ark tool project,run on Win7 x86/x64☆113Updated 7 years ago
- Simple Intel VT-x hypervisor☆293Updated last year
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆81Updated 6 years ago