hkhk366 / Memory_Codes_Injection
Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.
☆10Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for Memory_Codes_Injection
- wow64 syscall filter☆13Updated 10 years ago
- simple plugin for lastest olly versions to display the callstack☆15Updated 11 years ago
- ☆11Updated 9 years ago
- Windows registry files interactive viewer☆9Updated 7 years ago
- F**k ssdt hook in np, tp, hs☆10Updated 10 years ago
- ☆13Updated 7 years ago
- A project dedicated towards researching the Windows operating system's kernel mode enviornment.☆8Updated 8 years ago
- ☆16Updated 8 years ago
- ☆11Updated 7 years ago
- meta op for pe file☆11Updated 8 years ago
- Lists work items being queued currently.☆12Updated 9 years ago
- windows内核小工具,包含APP和driver☆11Updated 9 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 6 years ago
- Windows Kernel Mode PCRE☆10Updated 9 years ago
- Ssdt Hook Detection tool☆12Updated 8 years ago
- Windows device tree walker☆15Updated 6 years ago
- Dark Cloud Virus☆7Updated 7 years ago
- CVE-2014-0816☆24Updated 8 years ago
- Demos presented on Hackerfest 2015☆13Updated 9 years ago
- Windows过滤驱动-helloworld☆20Updated 9 years ago
- An idea in hooking APIs by replacing calls that lead to them☆1Updated 2 years ago
- does reflective dll injection☆8Updated 10 years ago
- an efficient yet easy to use network packet builder and parser☆11Updated 7 years ago