Oxygen1a1 / callstack_spoofLinks
☆128Updated 2 years ago
Alternatives and similar repositories for callstack_spoof
Users that are interested in callstack_spoof are comparing it to the libraries listed below
Sorting:
- ☆144Updated 3 years ago
- Example of reading process memory through kernel special APC☆110Updated 2 years ago
- Use RTCore64 to map your driver on windows 11.☆145Updated 8 months ago
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆137Updated this week
- 从MmPfnData中枚举进程和页目录基址☆204Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆149Updated last year
- ☆45Updated last year
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆102Updated last year
- ☆223Updated 2 years ago
- ☆192Updated 2 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆55Updated last year
- A library to assist with memory & code protection.☆65Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Updated 3 years ago
- Bypass detection from Flare-floss☆29Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆102Updated 2 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆117Updated 8 months ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- ☆159Updated last year
- a monitoring windows driver calls kernel api tools☆126Updated last year
- r/w virtual memory without attach☆214Updated 2 years ago
- ☆173Updated 3 years ago
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆157Updated last year
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Updated 5 years ago
- Kernel Level NMI Callback Blocker☆154Updated 4 months ago
- Standard Kernel Library for Windows manipulation in C++☆196Updated 7 months ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆65Updated 7 months ago
- manual map unsigned driver over signed memory☆214Updated last year
- PTE hook☆33Updated last year
- ShotHv☆152Updated 3 years ago
- IoCreateDriver Implementation, it can be useful if you're trying to bypass anticheats☆120Updated last month