SamLarenN / ReadWriteDriver_x64_AsmLinks
x64 Driver written in FASM
☆24Updated 8 years ago
Alternatives and similar repositories for ReadWriteDriver_x64_Asm
Users that are interested in ReadWriteDriver_x64_Asm are comparing it to the libraries listed below
Sorting:
- Analyze PatchGuard☆59Updated 7 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆22Updated 6 months ago
- Open Source 64 bit disassembler for Windows☆23Updated 6 years ago
- Use the Cheat Engine driver in your own process!☆24Updated 7 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- A Windows game hacking framework☆41Updated 8 years ago
- unicorn emulator for x64dbg☆34Updated 7 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Updated 3 years ago
- XEDParse emulator based on asmjit/asmtk.☆20Updated last year
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- My take on the capcom driver vulnerability☆28Updated 8 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆21Updated 7 years ago
- ☆27Updated 7 years ago
- PE Library x86☆21Updated 6 years ago
- Simple program for static hooking dynamic libraries in executable application☆23Updated 11 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆32Updated 5 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Some eternal WIP stuff :)☆19Updated 5 months ago
- P2C Loader based on blackbone, used by isolation.top and others.☆13Updated 7 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆23Updated 8 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- An ark tool's driver☆40Updated 8 years ago
- Wow64 syscall hook☆41Updated 8 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Updated 14 years ago
- NT reversal☆26Updated 7 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- A drop-in replacement for the C++ STL for kernel mode Windows drivers. The goal is to have implementations for things like the standard a…☆31Updated 9 years ago
- Reversed C++ source code from the CAPCOM.SYS driver☆14Updated 8 years ago
- ☆26Updated 8 years ago