SamLarenN / ReadWriteDriver_x64_AsmLinks
x64 Driver written in FASM
☆24Updated 8 years ago
Alternatives and similar repositories for ReadWriteDriver_x64_Asm
Users that are interested in ReadWriteDriver_x64_Asm are comparing it to the libraries listed below
Sorting:
- Analyze PatchGuard☆59Updated 7 years ago
- PE Library x86☆21Updated 6 years ago
- ☆27Updated 7 years ago
- A drop-in replacement for the C++ STL for kernel mode Windows drivers. The goal is to have implementations for things like the standard a…☆31Updated 9 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆23Updated 7 months ago
- Open Source 64 bit disassembler for Windows☆23Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Updated 3 years ago
- A Windows game hacking framework☆41Updated 9 years ago
- Use the Cheat Engine driver in your own process!☆24Updated 7 years ago
- win32/x64 obfuscate framework☆33Updated 6 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- P2C Loader based on blackbone, used by isolation.top and others.☆13Updated 7 years ago
- Crash Windows 10 up to RS2 from an unprivileged process☆42Updated 7 years ago
- Simple program for static hooking dynamic libraries in executable application☆23Updated 11 years ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆33Updated 5 years ago
- unicorn emulator for x64dbg☆34Updated 7 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- A sample on how to inject a DLL from a kernel driver☆62Updated 9 years ago
- New handle stealing technique for windows apps☆13Updated 7 years ago
- XEDParse emulator based on asmjit/asmtk.☆20Updated last year
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- Wow64 syscall hook☆41Updated 8 years ago
- Some eternal WIP stuff :)☆19Updated 5 months ago
- Shareds for kernel developement☆28Updated 11 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Updated 6 years ago
- An ark tool's driver☆40Updated 8 years ago
- Allows you to hook D3D dynamically - without having to research addresses or hook public API. Just grab the device!☆33Updated 10 years ago