gmh5225 / S4Mapper
Not mine, just saved
☆12Updated last year
Alternatives and similar repositories for S4Mapper:
Users that are interested in S4Mapper are comparing it to the libraries listed below
- ☆29Updated 2 years ago
- ☆22Updated 2 years ago
- Stealing signatures from pe files☆17Updated last month
- Disable NMI Callbacks with Kernelmode Driver☆18Updated 2 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Updated last year
- RWX Section Abusing☆17Updated last year
- ☆13Updated 11 months ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- ☆17Updated last year
- An example code of CiGetCertPublisherName☆15Updated 3 years ago
- Libraries written in inline assembly☆18Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 7 months ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆42Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆19Updated 3 years ago
- anti cheat drv open source☆16Updated last year
- ☆10Updated 3 years ago
- ☆27Updated last year
- Header only UM AC "bypass"☆19Updated last year
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- ☆14Updated 4 years ago
- ☆21Updated last year
- ☆27Updated 2 years ago
- ☆17Updated 2 years ago
- neat way to detect memory read using nt layer function.☆14Updated last year
- ☆27Updated 2 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆19Updated last year
- a driver to enumerate registered pnp callbacks for a particular interface class based on reversal of IoRegisterPlugPlayNotification☆11Updated last year
- Achieving code execution through abusing vectored exception handling☆17Updated last year
- x64 assembler library☆31Updated 11 months ago