armasm / skprotect_sourceLinks
x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)
☆84Updated 6 years ago
Alternatives and similar repositories for skprotect_source
Users that are interested in skprotect_source are comparing it to the libraries listed below
Sorting:
- Some garbage drivers written for getting started☆66Updated 5 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 6 years ago
- ayy debuger☆90Updated last year
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆94Updated 4 years ago
- first commit☆62Updated 4 years ago
- Process path modification x64☆57Updated 7 years ago
- ☆80Updated 3 years ago
- ☆70Updated 3 years ago
- Using C++ STL on Windows kernle development☆90Updated 6 years ago
- Intel Virtualization Technology demo☆69Updated 8 years ago
- ☆27Updated 7 years ago
- Windows Kernel Template Library☆114Updated 3 years ago
- windows kernel deriver loader(pro)☆47Updated 4 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆66Updated 6 years ago
- Communication via callback☆74Updated 5 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆152Updated 6 years ago
- 不使用3环挂钩进行DWM桌面绘制☆79Updated 3 years ago
- ☆48Updated 6 years ago
- noob hooking dwm for overlay☆82Updated 4 years ago
- KDMAPPER build [1809,1903,1909,2004]☆75Updated 5 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆143Updated 4 years ago
- Collect different versions of Crucial modules.☆144Updated last year
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆52Updated 4 years ago
- Hook system calls, context switches, page faults and more.☆35Updated 6 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 3 years ago
- get ntdll syscall index☆12Updated 5 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
- Another method to anti ThreadHideFromDebugger☆37Updated 6 years ago