Oxygen1a1 / callstack_spoof
☆122Updated last year
Alternatives and similar repositories for callstack_spoof:
Users that are interested in callstack_spoof are comparing it to the libraries listed below
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆88Updated last month
- ☆128Updated 2 years ago
- Example of reading process memory through kernel special APC☆103Updated last year
- 从MmPfnData中枚举进程和页目录基址☆160Updated last year
- Use RTCore64 to map your driver on windows 11.☆103Updated 3 weeks ago
- ☆33Updated 5 months ago
- ☆176Updated last year
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆117Updated 9 months ago
- r/w virtual memory without attach☆166Updated last year
- ☆198Updated 2 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆51Updated 5 months ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆152Updated 6 months ago
- ☆162Updated 3 years ago
- a monitoring windows driver calls kernel api tools☆103Updated 8 months ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆40Updated 10 months ago
- ☆69Updated 2 years ago
- ☆156Updated 2 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- 不使用3环挂钩进行DWM桌面绘制☆79Updated 3 years ago
- DSE & PG bypass via BYOVD attack☆43Updated 11 months ago
- manual map unsigned driver over signed memory☆186Updated 11 months ago
- Standard Kernel Library for Windows hacking in C++☆132Updated 3 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆167Updated last year
- Kernel dwm render☆139Updated last year
- ☆152Updated 9 months ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 2 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆209Updated 4 years ago
- x64/x86 Hooking through VectoredExceptionHandler (PAGE_GUARD method)☆49Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆111Updated 3 years ago
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆137Updated 11 months ago