bb33bb / r3epthookLinks
使用vt进行无痕hook,支持r3
☆60Updated 6 years ago
Alternatives and similar repositories for r3epthook
Users that are interested in r3epthook are comparing it to the libraries listed below
Sorting:
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆69Updated 4 years ago
- the basic version of the ring0 physical memory read/write tool☆88Updated 6 years ago
- VT Hook☆47Updated last year
- ☆27Updated 7 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- first commit☆63Updated 4 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆52Updated 4 years ago
- 基于Intel-VT技术的windows内核增强型驱动☆29Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆81Updated 3 years ago
- ☆80Updated 3 years ago
- ☆70Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆95Updated 2 years ago
- ☆53Updated 2 years ago
- Open source anti cheat engine☆42Updated last year
- 自写驱动内存注入☆27Updated 4 years ago
- Intel Virtualization Technology demo☆69Updated 8 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆100Updated 5 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- ayy debuger☆89Updated last year
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆82Updated 6 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆74Updated 2 years ago
- ☆99Updated 7 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 2 years ago
- Win7内核私有符号结构转储☆68Updated 3 years ago
- intel vt-x hypervisor ept☆25Updated 5 years ago
- 硬件虚拟化☆47Updated last week
- ☆21Updated 5 years ago
- APEX-EACBypass(usermode)☆47Updated 6 years ago
- Process path modification x64☆56Updated 7 years ago
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆44Updated last year