fIappy / infhook19041Links
☆125Updated 5 years ago
Alternatives and similar repositories for infhook19041
Users that are interested in infhook19041 are comparing it to the libraries listed below
Sorting:
- Collect different versions of Crucial modules.☆141Updated 10 months ago
- Hide codes/data in the kernel address space.☆188Updated 4 years ago
- ☆110Updated 5 years ago
- ☆97Updated 7 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- ☆160Updated 4 years ago
- hook msr by amd svm☆120Updated 5 years ago
- win10 pgContext dynamic dump (btc version)☆105Updated 5 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 5 years ago
- Intel Virtualization Technology demo☆66Updated 8 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆186Updated 8 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆136Updated 3 years ago
- ayy debuger☆89Updated last year
- An Ark tool project,run on Win7 x86/x64☆114Updated 7 years ago
- A hypervisor hiding user-mode memory using EPT☆108Updated 7 years ago
- ShotHv☆143Updated 3 years ago
- ☆65Updated 6 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆108Updated 2 years ago
- ☆133Updated 2 years ago
- Analyze Windows x64 Kernel Memory Layout☆121Updated 4 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆141Updated last year
- first commit☆61Updated 4 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆149Updated 5 years ago
- ☆166Updated 3 years ago
- ☆153Updated 5 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆94Updated 2 years ago
- Easy Anti PatchGuard☆219Updated 4 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆91Updated 2 months ago
- Hook system calls, context switches, page faults and more.☆35Updated 5 years ago
- ☆80Updated 3 years ago