fobricia / KsDumper
Dumping processes using the power of kernel space !
☆19Updated 4 years ago
Alternatives and similar repositories for KsDumper:
Users that are interested in KsDumper are comparing it to the libraries listed below
- LSASS INJECTOR☆34Updated 6 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆68Updated 2 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆81Updated 2 years ago
- Compile-Time Calls Obfuscator for C++14+☆38Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆103Updated 2 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated last year
- 滥用cow机制进行全局注入☆95Updated 4 years ago
- 不使用3环挂钩进行DWM桌面绘制☆79Updated 3 years ago
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆172Updated 2 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆60Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆128Updated 3 years ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆27Updated 4 years ago
- inject dll from kernal mode to user mode process use Apc☆32Updated 5 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆207Updated 4 years ago
- A simple program to obfuscate code written in cpp.☆46Updated 9 months ago
- ☆68Updated 2 years ago
- https://githacks.org/Shawick/goodeye.git☆46Updated 4 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆67Updated 2 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆44Updated this week
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆57Updated 3 years ago
- 无痕注入1☆71Updated 3 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆116Updated 8 months ago
- Use RTCore64 to map your driver on windows 11.☆96Updated 10 months ago
- Dynamically generated obfuscated jumps and/or function calls☆34Updated last year
- Example of reading process memory through kernel special APC☆101Updated last year
- ☆66Updated 6 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆79Updated 4 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago