Mrikan8 / kernel-hookLinks
Just tried, unusable
☆50Updated last year
Alternatives and similar repositories for kernel-hook
Users that are interested in kernel-hook are comparing it to the libraries listed below
Sorting:
- cr3 shuffle driver☆73Updated last year
- driver that communicates using a shared section☆85Updated 10 months ago
- Aimbot Esp Spoofer Driver☆53Updated 3 years ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆71Updated last year
- PoC kernel to usermode injection☆103Updated last year
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆49Updated 4 months ago
- Made by scammer so i leak for free ! have fun☆56Updated 2 years ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆148Updated last year
- A simple MmCopyMemory hook.☆37Updated 3 years ago
- ☆43Updated 2 years ago
- Hardware ID☆63Updated 3 years ago
- Kernel Level NMI Callback Blocker☆154Updated 4 months ago
- Kernel and Usermode Spoofer for SCP:SL☆58Updated last year
- Fixes the "Device\Nal is already in use" error on kdmapper.☆19Updated 3 years ago
- ☆46Updated last year
- DMA PE (Portable Executable) Dumper with DTB patching capabilities.☆51Updated 10 months ago
- Windows driver mapper via the UEFI☆55Updated 6 months ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆70Updated 4 months ago
- My Fortnite Cheat SDK☆27Updated last year
- ☆47Updated 3 years ago
- Fortnite cheat , Fortnite External , Kernel , Fortnite UD , undetected☆72Updated last year
- ☆14Updated 3 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆81Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆54Updated last year
- PAGE_GUARD based hooking library☆52Updated 3 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆47Updated 2 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆62Updated 3 years ago
- read / write memory from a proxy process by injecting shellcode☆20Updated last month
- Simple memory obfuscator.☆24Updated 3 years ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆95Updated 4 months ago