Oxygen1a1 / callstack_spoofLinks
☆120Updated last year
Alternatives and similar repositories for callstack_spoof
Users that are interested in callstack_spoof are comparing it to the libraries listed below
Sorting:
- ☆136Updated 2 years ago
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆103Updated 2 months ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆73Updated 8 months ago
- 从MmPfnData中枚举进程和页目录基址☆178Updated last year
- Example of reading process memory through kernel special APC☆107Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆127Updated last year
- ☆37Updated 8 months ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- r/w virtual memory without attach☆180Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆43Updated last year
- ☆181Updated 2 years ago
- ☆206Updated 2 years ago
- manual map unsigned driver over signed memory☆195Updated last year
- InfinityHookProMax: Make InfinityHook great great again☆45Updated last year
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆154Updated 9 months ago
- a monitoring windows driver calls kernel api tools☆103Updated 11 months ago
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆144Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆172Updated last year
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆94Updated 3 weeks ago
- Use RTCore64 to map your driver on windows 11.☆119Updated last month
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆91Updated last year
- ☆69Updated 3 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆68Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- Standard Kernel Library for Windows manipulation in C++☆162Updated 6 months ago
- ☆167Updated 3 years ago
- 不使用3 环挂钩进行DWM桌面绘制☆80Updated 3 years ago
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆100Updated 3 weeks ago
- x64/x86 Hooking through VectoredExceptionHandler (PAGE_GUARD method)☆53Updated last year
- ☆169Updated 3 years ago