danielkrupinski / KernelPID
Example Windows Kernel-mode Driver which finds process ID by executable file name.
☆16Updated 4 years ago
Related projects: ⓘ
- ☆12Updated 4 years ago
- driver interface with dll-injection capabilities☆28Updated 3 years ago
- Use the Cheat Engine driver in your own process!☆22Updated 6 years ago
- ☆22Updated this week
- Generate SDKs from Unreal Engine games (UE1 - 4 supported).☆14Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆23Updated 2 years ago
- anti-cheat based on user-mode tricks and undocumented methods☆22Updated 7 years ago
- Helps to find patched modules☆26Updated 3 years ago
- NT reversal☆24Updated 6 years ago
- Memory Guard Library☆9Updated 3 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆9Updated 4 years ago
- Unique signature maker plugin for x64dbg☆13Updated 2 years ago
- simply manual map any system image☆16Updated 3 years ago
- ☆15Updated this week
- ☆11Updated this week
- ☆17Updated 4 years ago
- small little public internal base/cheat i'm currently working on☆25Updated 5 years ago
- ☆47Updated 5 years ago
- ☆10Updated 6 years ago
- Simple driver loader for windows☆17Updated 4 years ago
- easy to use vtable hook with RTTI support☆23Updated 4 years ago
- web based cloud menu for cheats☆15Updated 3 years ago
- p2c loader(this is also the loader isolation.top used)☆14Updated 6 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆22Updated 3 years ago
- ☆37Updated this week
- ☆18Updated this week
- A simple open source module injector library x86/x64 for Windows☆21Updated 4 years ago
- Analysing and defeating PatchGuard universally☆34Updated 3 years ago
- ☆24Updated this week
- Single header library to simplify the usage of direct syscalls. x64/x86☆12Updated last year