ReFo0 / kernel-open-processLinks
☆17Updated last year
Alternatives and similar repositories for kernel-open-process
Users that are interested in kernel-open-process are comparing it to the libraries listed below
Sorting:
- A simple MmCopyMemory hook.☆38Updated 3 years ago
- ☆53Updated 2 years ago
- squad internal simple base☆15Updated last year
- ☆48Updated 3 years ago
- ☆46Updated 3 years ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆51Updated 11 months ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆51Updated last year
- ☆32Updated 3 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- Made by scammer so i leak for free ! have fun☆54Updated 2 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- ☆83Updated last year
- ☆42Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆92Updated 2 years ago
- ☆50Updated last year
- Driver hooks a function from NT windows. read/write memory and use windows GDI to draw on buffer from kernel.☆36Updated 3 years ago
- page table manipulation to gain physical r/w☆43Updated last year
- just proof of concept. hooking MmCopyMemory PG safe.☆75Updated last year
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- ☆54Updated 2 years ago
- ☆22Updated 2 years ago
- Discarded Section Manual Map☆69Updated 5 years ago
- ☆21Updated 3 years ago
- Detect removed thread from PspCidTable.☆72Updated 3 years ago
- ☆25Updated last year
- Simple memory obfuscator.☆24Updated 2 years ago
- I've developed a rather effective driver for DLL injection targeting EAC Protected Games, and since I'm not aware of any notable games ut…☆93Updated last year
- anti crack system protector☆97Updated last year
- ☆70Updated 3 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆28Updated 4 years ago