ThomasonZhao / InfinityHookProMax
InfinityHookProMax: Make InfinityHook great great again
☆42Updated last year
Alternatives and similar repositories for InfinityHookProMax:
Users that are interested in InfinityHookProMax are comparing it to the libraries listed below
- clearing traces of a loaded driver☆46Updated 2 years ago
- ☆71Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- A library to assist with memory & code protection.☆53Updated 11 months ago
- Windows Kernel Misc☆23Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆40Updated 9 months ago
- ☆126Updated 2 years ago
- ☆48Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆70Updated 2 years ago
- ☆68Updated 2 years ago
- 将驱动映射到会话空间☆33Updated 2 years ago
- ☆50Updated 2 years ago
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆53Updated 2 years ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆49Updated last year
- https://githacks.org/Shawick/goodeye.git☆46Updated 4 years ago
- Hiding a system thread against conventional means of detection☆37Updated 4 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆82Updated last year
- ☆26Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- Example driver on how to use SKLib☆31Updated 3 months ago
- Only for Stress-Testing☆24Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- Kernel Level NMI Callback Blocker☆64Updated 5 months ago
- A poc that abuses Enclave☆36Updated 2 years ago
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆34Updated 10 months ago
- page table manipulation to gain physical r/w☆40Updated 9 months ago
- ☆45Updated 2 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆46Updated 11 months ago