huoji120 / CowInjecterLinks
滥用cow机制进行全局注入
☆98Updated 4 years ago
Alternatives and similar repositories for CowInjecter
Users that are interested in CowInjecter are comparing it to the libraries listed below
Sorting:
- ☆69Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆96Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆144Updated 4 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 3 years ago
- ☆141Updated 2 years ago
- Example of reading process memory through kernel special APC☆110Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 3 years ago
- ☆80Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆218Updated 5 years ago
- A Memory Read And Write the Hide Driver☆72Updated 4 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆76Updated 3 years ago
- https://githacks.org/Shawick/goodeye.git☆51Updated 5 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated 2 years ago
- VT Hook☆48Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 7 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Updated 4 years ago
- Only for Stress-Testing☆26Updated 3 years ago
- A library to assist with memory & code protection.☆64Updated last year
- hidden_syscall - syscaller without using syscall instruction in code☆62Updated 2 years ago
- 无痕注入1☆76Updated 4 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆94Updated 4 years ago
- ShotHv☆148Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆91Updated 6 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆51Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Updated 3 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago
- ☆51Updated last year