danielkrupinski / helloworld-driverLinks
☆11Updated 5 years ago
Alternatives and similar repositories for helloworld-driver
Users that are interested in helloworld-driver are comparing it to the libraries listed below
Sorting:
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago
- ☆14Updated 4 years ago
- Mono process injector☆22Updated 6 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- communicate with kernel using a image on disk☆15Updated last year
- Kernel Injector pasted from various different Github repositories.☆19Updated 5 years ago
- A User Mode (UM) Framework which can be used to make anything. From cheats, to anti cheats or even a normal program. The framework will s…☆29Updated 4 years ago
- ☆15Updated last year
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆22Updated 3 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆12Updated 4 years ago
- UAC - Cheat developer platform☆28Updated 3 years ago
- ☆19Updated 4 years ago
- A simple Kernel Mode Anticheat Project open to developement.☆14Updated 3 years ago
- A Kernel driver for using against anti cheats like EAC or BE☆13Updated 3 years ago
- ☆8Updated 3 years ago
- Lightweight, C-based memory library for external CSGO process hacking☆10Updated 5 years ago
- Memory Guard Library☆11Updated 4 years ago
- Header only UM AC "bypass"☆19Updated last year
- Detect if a mouse event injected☆39Updated 7 years ago
- A simple NtUserGetAsyncKeyState wrapper☆38Updated 2 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 6 years ago
- ☆46Updated 3 years ago
- ☆30Updated last year
- Helps to find patched modules☆29Updated 4 years ago
- ☆38Updated 8 years ago
- Example Windows Kernel-mode Driver which finds process ID by executable file name.☆18Updated 5 years ago
- ☆25Updated last year
- Executing EXE Files From Memory☆12Updated last year