Oxygen1a1 / callstack_spoofLinks
☆123Updated 2 years ago
Alternatives and similar repositories for callstack_spoof
Users that are interested in callstack_spoof are comparing it to the libraries listed below
Sorting:
- 从MmPfnData中枚举进程和页目录基址☆185Updated 2 years ago
- Example of reading process memory through kernel special APC☆110Updated 2 years ago
- Use RTCore64 to map your driver on windows 11.☆133Updated 5 months ago
- ☆139Updated 2 years ago
- ☆183Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆137Updated last year
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆117Updated last week
- ☆40Updated last year
- ☆216Updated 2 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆217Updated 4 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆89Updated last year
- ☆169Updated 3 years ago
- r/w virtual memory without attach☆198Updated 2 years ago
- a monitoring windows driver calls kernel api tools☆120Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆50Updated last year
- ☆155Updated last year
- manual map unsigned driver over signed memory☆201Updated last year
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆150Updated last year
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆108Updated 4 months ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆117Updated 3 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆74Updated 3 years ago
- InfinityHookProMax: Make InfinityHook great great again☆48Updated 2 years ago
- load unsigned kernel-driver by patching dse in 248 lines☆133Updated last year
- Standard Kernel Library for Windows manipulation in C++☆184Updated 4 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆97Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆164Updated 3 years ago
- ☆69Updated 3 years ago
- A Memory Read And Write the Hide Driver☆71Updated 4 years ago
- Bypass detection from Flare-floss☆26Updated last year
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆148Updated 2 years ago