Oxygen1a1 / callstack_spoofLinks
☆128Updated 2 years ago
Alternatives and similar repositories for callstack_spoof
Users that are interested in callstack_spoof are comparing it to the libraries listed below
Sorting:
- ☆144Updated 3 years ago
- Use RTCore64 to map your driver on windows 11.☆140Updated 8 months ago
- Example of reading process memory through kernel special APC☆109Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆201Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆146Updated last year
- ☆43Updated last year
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆135Updated this week
- ☆192Updated 2 years ago
- ☆220Updated 2 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆98Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆54Updated last year
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆156Updated last year
- r/w virtual memory without attach☆209Updated 2 years ago
- a monitoring windows driver calls kernel api tools☆123Updated last year
- Bypass detection from Flare-floss☆28Updated 2 years ago
- ☆157Updated last year
- Kernel Level NMI Callback Blocker☆152Updated 3 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆101Updated 2 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Updated 5 years ago
- A library to assist with memory & code protection.☆65Updated last year
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆113Updated 7 months ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆77Updated 3 years ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆62Updated 6 months ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆145Updated 2 years ago
- manual map unsigned driver over signed memory☆212Updated last year
- IoCreateDriver Implementation, it can be useful if you're trying to bypass anticheats☆118Updated last month
- ☆173Updated 3 years ago
- load unsigned kernel-driver by patching dse in 248 lines☆137Updated last year
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆170Updated last year
- Standard Kernel Library for Windows manipulation in C++☆195Updated 6 months ago