huoji120 / huoji_debugerLinks
ayy debuger
☆90Updated last year
Alternatives and similar repositories for huoji_debuger
Users that are interested in huoji_debuger are comparing it to the libraries listed below
Sorting:
- the basic version of the ring0 physical memory read/write tool☆90Updated 6 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- A hypervisor hiding user-mode memory using EPT☆108Updated 7 years ago
- ☆98Updated 8 years ago
- Communication via callback☆74Updated 6 years ago
- Hide codes/data in the kernel address space.☆187Updated 4 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆95Updated 4 years ago
- first commit☆62Updated 4 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆126Updated 3 years ago
- Windows Kernel Driver dlls injector using APC☆63Updated 7 years ago
- ☆125Updated 5 years ago
- APEX-EACBypass(usermode)☆47Updated 6 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆117Updated 3 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆194Updated 9 years ago
- PoC: make WDA_MONITOR window transparent on screenshot/capture☆99Updated 5 years ago
- Intercepting DeviceControl via WPP☆136Updated 5 years ago
- ☆106Updated last year
- Collect different versions of Crucial modules.☆144Updated last year
- Some garbage drivers written for getting started☆66Updated 5 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆113Updated 7 years ago
- KDMAPPER build [1809,1903,1909,2004]☆74Updated 5 years ago
- ShotHv☆148Updated 3 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆122Updated 8 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆96Updated 5 years ago
- ☆184Updated 6 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Updated 7 years ago
- Capcom wrapper with safety in mind.☆82Updated 7 years ago