byte2mov / anti-processLinks
stop any process from looking into your process by hooking.
☆21Updated last year
Alternatives and similar repositories for anti-process
Users that are interested in anti-process are comparing it to the libraries listed below
Sorting:
- Hardware ID☆61Updated 3 years ago
- driver that communicates using a shared section☆80Updated 9 months ago
- page table manipulation to gain physical r/w☆42Updated last year
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 3 years ago
- Simple memory obfuscator.☆24Updated 3 years ago
- cr3 shuffle driver☆69Updated last year
- Example Windows Kernel-mode Driver which enumerates running processes.☆58Updated 3 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆48Updated 3 months ago
- The sequel to Voyager☆84Updated last year
- Bypass using kernel driver (not finish).☆20Updated 2 years ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆68Updated last year
- PoC kernel to usermode injection☆96Updated last year
- ☆43Updated 2 years ago
- ☆28Updated 2 years ago
- ☆83Updated 4 years ago
- PAGE_GUARD based hooking library☆52Updated 3 years ago
- simple driver to read and write☆17Updated 8 months ago
- Made by scammer so i leak for free ! have fun☆55Updated 2 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆75Updated 4 years ago
- Disk based DMA for ATA and SCSI☆37Updated 2 years ago
- ☆45Updated last year
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 6 years ago
- ☆47Updated 3 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆42Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Updated 7 years ago
- POC kernel driver with hidden system thread☆13Updated last year
- Compile-Time Calls Obfuscator for C++14+☆50Updated 2 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆66Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆80Updated 2 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆57Updated 10 months ago