haidragon / NewInjectDrvLinks
APC注入DLL内核层
☆23Updated 7 years ago
Alternatives and similar repositories for NewInjectDrv
Users that are interested in NewInjectDrv are comparing it to the libraries listed below
Sorting:
- Some garbage drivers written for getting started☆66Updated 5 years ago
- IO隐藏通信封装☆17Updated 4 years ago
- ☆27Updated 8 years ago
- VT Hook☆49Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 7 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆53Updated 4 years ago
- ☆14Updated 3 years ago
- ☆35Updated 5 years ago
- The driver STL library used by myself☆13Updated 3 years ago
- ☆69Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 4 years ago
- Process path modification x64☆59Updated 7 years ago
- ☆18Updated 3 years ago
- 自写驱动内存注入☆29Updated 4 years ago
- https://githacks.org/Shawick/goodeye.git☆52Updated 5 years ago
- Not mine. Only for saving☆26Updated 3 years ago
- [POC Detected]Bypass BE Anti Dll Injection (POC/Need Driver)☆17Updated 5 years ago
- using gpuz to load driver☆35Updated 6 years ago
- simply manual map any system image☆18Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 7 years ago
- Injector with kernel power☆17Updated 4 years ago
- For Example. See Miro's Blog☆30Updated 3 years ago
- Kernel Hook X64☆26Updated 5 years ago
- direct systemcalls with a modern c++20 interface.☆45Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- ☆13Updated 5 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago
- ☆17Updated 3 years ago