Rythorndoran / HideDLL
Hide a loaded dynamic link library from memory
☆30Updated 3 years ago
Alternatives and similar repositories for HideDLL
Users that are interested in HideDLL are comparing it to the libraries listed below
Sorting:
- clearing traces of a loaded driver☆47Updated 2 years ago
- meme hwid spoofer driver. If you need an undetected HWID spoofer use Cheato Spoofer @ https://chea.to☆36Updated 5 months ago
- Windows Kernel Misc☆23Updated last year
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆22Updated 3 years ago
- ☆53Updated 2 years ago
- ☆25Updated last year
- InfinityHookProMax: Make InfinityHook great great again☆45Updated last year
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- Bypass using kernel driver (not finish).☆20Updated 2 years ago
- ☆42Updated 3 years ago
- ☆46Updated 3 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- x64/x86 Hooking through VectoredExceptionHandler (PAGE_GUARD method)☆53Updated last year
- working injector bp (BE EAC & VANGUARD)☆36Updated 2 years ago
- ☆47Updated 4 years ago
- ☆37Updated last year
- ☆50Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆50Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago
- ☆48Updated 3 years ago
- page table manipulation to gain physical r/w☆41Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆86Updated last year
- ☆30Updated 2 years ago
- I've developed a rather effective driver for DLL injection targeting EAC Protected Games, and since I'm not aware of any notable games ut…☆89Updated last year
- ☆68Updated 3 years ago
- POC usermode <=> kernel communication via ALPC.☆56Updated 11 months ago
- i stole this from some guys private repo on github☆56Updated 3 years ago
- ☆69Updated 2 years ago
- ☆21Updated 2 years ago