armasm / skprotect_sourceLinks
x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)
☆82Updated 6 years ago
Alternatives and similar repositories for skprotect_source
Users that are interested in skprotect_source are comparing it to the libraries listed below
Sorting:
- the basic version of the ring0 physical memory read/write tool☆88Updated 5 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- ayy debuger☆89Updated last year
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- Process path modification x64☆56Updated 7 years ago
- ☆80Updated 3 years ago
- first commit☆63Updated 4 years ago
- Hook system calls, context switches, page faults and more.☆35Updated 6 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆93Updated 4 years ago
- ☆70Updated 3 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆66Updated 6 years ago
- ☆125Updated 5 years ago
- Intel Virtualization Technology demo☆67Updated 8 years ago
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- Using C++ STL on Windows kernle development☆90Updated 6 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆141Updated 4 years ago
- Communication via callback☆72Updated 5 years ago
- ☆47Updated 6 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆107Updated 6 years ago
- ☆27Updated 7 years ago
- Collect different versions of Crucial modules.☆143Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆82Updated 3 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆151Updated 6 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆87Updated 4 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆98Updated 2 months ago
- old bypass☆34Updated 6 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆51Updated 4 years ago
- APEX-EACBypass(usermode)☆47Updated 6 years ago