hzqst / hiddenLinks
Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc
☆16Updated 6 years ago
Alternatives and similar repositories for hidden
Users that are interested in hidden are comparing it to the libraries listed below
Sorting:
- ☆27Updated 6 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- map driver to memory☆25Updated 6 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 6 years ago
- ☆23Updated 7 years ago
- Map memory to user space and manipulate user memory, using capmon☆23Updated 6 years ago
- ☆33Updated 4 years ago
- Analyze PatchGuard☆58Updated 6 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆28Updated 7 years ago
- ☆28Updated 4 years ago
- ☆13Updated 10 months ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- ☆13Updated 6 years ago
- Windows Console Monitor☆34Updated 5 years ago
- A command line tool to load and unload a device driver.☆47Updated 7 years ago
- ☆40Updated 5 years ago
- An ark tool's driver☆40Updated 8 years ago
- ☆19Updated 5 years ago
- 大表哥的Syscall-Monitor☆34Updated 5 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- ☆26Updated 7 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Updated 2 years ago
- ☆21Updated 6 years ago
- Another method to anti ThreadHideFromDebugger☆36Updated 6 years ago
- Windows anti-rootkit library☆39Updated 10 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago