Rootkit & Anti-rootkit
☆42Jan 27, 2024Updated 2 years ago
Alternatives and similar repositories for KernelV
Users that are interested in KernelV are comparing it to the libraries listed below
Sorting:
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- Inject dll to process in driver☆10Aug 27, 2024Updated last year
- c++ implementation of windows heavens gate☆71Feb 12, 2021Updated 5 years ago
- ☆36Mar 19, 2019Updated 7 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- Analyze Windows x64 Kernel Memory Layout☆130Nov 19, 2020Updated 5 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- HTTP/HTTPS/DNS inspector (windows driver)☆27Feb 20, 2019Updated 7 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- ☆53Dec 21, 2022Updated 3 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- x86/x64 dll injector☆31May 17, 2022Updated 3 years ago
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- UAC - Cheat developer platform☆28Oct 29, 2021Updated 4 years ago
- ☆125May 23, 2020Updated 5 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 5 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- LPC (Local Procedure Call) is a portion of Windows NT kernel, used for fast communication between threads or processes. It can be also us…☆15Mar 21, 2021Updated 4 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- eac memory sig maker☆14Jun 10, 2021Updated 4 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆49Jun 3, 2021Updated 4 years ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Feb 7, 2022Updated 4 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- Libraries written in inline assembly☆19Aug 7, 2023Updated 2 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago