fengjixuchui / khaleesi
Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.
☆58Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for khaleesi
- Handling C++ & __try exceptions without the need of built-in handlers.☆65Updated 3 years ago
- scans through physical memory and paging tables in kernel mode☆106Updated 4 years ago
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆101Updated 2 years ago
- BetaShield Windows x86 Ring3 Anticheat v2☆36Updated 7 years ago
- ☆78Updated 3 years ago
- x64 manual mapper using inline syscalls☆5Updated 3 years ago
- ☆44Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆110Updated 2 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆84Updated 5 years ago
- x64 syscall caller in C++.☆84Updated 6 years ago
- Intercepting DeviceControl via WPP☆127Updated 5 years ago
- ☆49Updated 2 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆103Updated last year
- Example Windows Kernel-mode Driver which enumerates running processes.☆54Updated 2 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆65Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆63Updated last year
- A lightweight BattlEye emulator of the launcher☆57Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆80Updated last year
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆67Updated last year
- Obfuscate calls to imports by patching in stubs☆64Updated 3 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆89Updated 3 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆63Updated last year
- ☆52Updated 4 years ago
- ☆82Updated last year
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆59Updated 4 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆80Updated 2 years ago