cxmplex / KeReadProcessMemoryLinks
IOCTL based kernel read process memory.
☆12Updated 4 months ago
Alternatives and similar repositories for KeReadProcessMemory
Users that are interested in KeReadProcessMemory are comparing it to the libraries listed below
Sorting:
- Kernel mode to user mode injector☆10Updated 5 years ago
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆42Updated 4 years ago
- ☆25Updated last year
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- ☆25Updated 3 years ago
- UAC - Cheat developer platform☆28Updated 3 years ago
- ☆19Updated 4 years ago
- Spoofer for NtUserSendInput☆38Updated 3 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆24Updated 2 years ago
- ☆29Updated 4 years ago
- DirectX9 Overlay, C++.☆24Updated 5 years ago
- ☆21Updated 3 years ago
- UD overlay using SetWindowsHookEx☆16Updated 3 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- patch eft functions to allow for offline matches without battleye running☆51Updated 2 years ago
- Memory and RTTI reading/scanning☆28Updated 3 years ago
- ☆36Updated 5 years ago
- ☆12Updated 5 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆28Updated 4 years ago
- GDI Render in kernelmode☆10Updated 5 years ago
- ☆50Updated 5 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆46Updated 4 years ago
- A wrapper class to hide the original calling address of a function☆57Updated 4 years ago
- ☆15Updated 3 years ago
- 🥭windows memory library aimed towards game hacking☆40Updated 5 years ago
- ☆46Updated 3 years ago
- ☆46Updated 3 years ago