cs1ime / sehcallLinks
Windows X64 mode use seh in manual mapped dll or manual mapped sys
☆76Updated 3 years ago
Alternatives and similar repositories for sehcall
Users that are interested in sehcall are comparing it to the libraries listed below
Sorting:
- ☆144Updated 3 years ago
- ☆69Updated 3 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆52Updated last year
- ☆72Updated 3 years ago
- InfinityHookProMax: Make InfinityHook great great again☆48Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆108Updated 3 years ago
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆44Updated last year
- 将驱动映射到会话空间☆38Updated 3 years ago
- noob hooking dwm for overlay☆81Updated 5 years ago
- ☆61Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 4 years ago
- https://githacks.org/Shawick/goodeye.git☆52Updated 5 years ago
- Windows Kernel Misc☆23Updated 2 years ago
- Example of reading process memory through kernel special APC☆110Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- PTE hook☆31Updated last year
- A library to assist with memory & code protection.☆65Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆98Updated 2 years ago
- first commit☆62Updated 5 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 7 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆111Updated 6 months ago
- POC usermode <=> kernel communication via ALPC.☆65Updated last year
- Top level overlay drawing for game cheating using dwm.exe☆46Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- ☆48Updated last year
- ☆69Updated 4 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- ☆63Updated 3 years ago
- ☆51Updated 2 years ago
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆72Updated 2 months ago