cs1ime / sehcall
Windows X64 mode use seh in manual mapped dll or manual mapped sys
☆67Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for sehcall
- DWM Overlay without modify .text☆44Updated 2 months ago
- ☆70Updated 2 years ago
- ☆125Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆39Updated 6 months ago
- InfinityHookProMax: Make InfinityHook great great again☆42Updated last year
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆81Updated last year
- Standard Kernel Library for Windows hacking in C++☆89Updated 3 months ago
- ☆69Updated 2 years ago
- Use RTCore64 to map your driver on windows 11.☆93Updated 7 months ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆80Updated 2 years ago
- A library to assist with memory & code protection.☆53Updated 8 months ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆104Updated 2 years ago
- Kernel dwm render☆127Updated last year
- clearing traces of a loaded driver☆44Updated 2 years ago
- A simple ida python script to find .data ptr☆47Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆80Updated last year
- ☆26Updated 2 years ago
- https://githacks.org/Shawick/goodeye.git☆44Updated 4 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆73Updated last year
- Very easy to use pdb parsing library with only one header file,You can use it even if you are a fool.☆9Updated 8 months ago
- ☆47Updated 2 years ago
- Example of reading process memory through kernel special APC☆98Updated last year
- noob hooking dwm for overlay☆73Updated 3 years ago
- ☆49Updated 2 years ago
- ☆86Updated 2 years ago