Oxygen1a1 / callstack_spoofLinks
☆124Updated 2 years ago
Alternatives and similar repositories for callstack_spoof
Users that are interested in callstack_spoof are comparing it to the libraries listed below
Sorting:
- Example of reading process memory through kernel special APC☆110Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆192Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆135Updated last year
- Use RTCore64 to map your driver on windows 11.☆139Updated 6 months ago
- ☆144Updated 2 years ago
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆127Updated 3 weeks ago
- ☆184Updated 2 years ago
- ☆217Updated 2 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆93Updated last year
- ☆156Updated last year
- r/w virtual memory without attach☆202Updated 2 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆52Updated last year
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Updated 5 years ago
- ☆41Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- Bypass detection from Flare-floss☆28Updated 2 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆75Updated 3 years ago
- manual map unsigned driver over signed memory☆205Updated last year
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆152Updated last year
- a monitoring windows driver calls kernel api tools☆120Updated last year
- InfinityHookProMax: Make InfinityHook great great again☆48Updated 2 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆110Updated 6 months ago
- IoCreateDriver Implementation, it can be useful if you're trying to bypass anticheats☆111Updated 6 months ago
- A library to assist with memory & code protection.☆65Updated last year
- ☆171Updated 3 years ago
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆44Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆97Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 3 years ago
- ☆180Updated 3 years ago
- A Memory Read And Write the Hide Driver☆72Updated 5 years ago