fIappy / infhook19041Links
☆125Updated 5 years ago
Alternatives and similar repositories for infhook19041
Users that are interested in infhook19041 are comparing it to the libraries listed below
Sorting:
- Collect different versions of Crucial modules.☆143Updated last year
- ☆115Updated 5 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 6 years ago
- Hide codes/data in the kernel address space.☆188Updated 4 years ago
- ☆98Updated 7 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆142Updated 4 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- Analyze Windows x64 Kernel Memory Layout☆122Updated 4 years ago
- hook msr by amd svm☆123Updated 5 years ago
- win10 pgContext dynamic dump (btc version)☆107Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆114Updated 8 years ago
- A hypervisor hiding user-mode memory using EPT☆108Updated 7 years ago
- ☆160Updated 4 years ago
- Collect various versions of ntoskrnl files☆55Updated last year
- ☆68Updated 6 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆101Updated 7 months ago
- first commit☆62Updated 4 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆82Updated 6 years ago
- ayy debuger☆89Updated last year
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆96Updated 2 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆144Updated 2 years ago
- Using C++ STL on Windows kernle development☆90Updated 6 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆70Updated 4 years ago
- Windows Kernel Template Library☆113Updated 3 years ago
- ☆153Updated 5 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆179Updated 7 years ago
- Hook system calls, context switches, page faults and more.☆35Updated 6 years ago
- Intel Virtualization Technology demo☆69Updated 8 years ago