luciouskami / RemoveFlagTestLinks
Another method to anti ThreadHideFromDebugger
☆37Updated 6 years ago
Alternatives and similar repositories for RemoveFlagTest
Users that are interested in RemoveFlagTest are comparing it to the libraries listed below
Sorting:
- Some garbage drivers written for getting started☆66Updated 6 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Updated 4 years ago
- ☆28Updated 8 years ago
- For Example. See Miro's Blog☆30Updated 3 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Updated 7 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- windows kernel deriver loader(pro)☆46Updated 4 years ago
- Modify process handle permissions☆61Updated 9 years ago
- ☆48Updated 7 years ago
- ☆39Updated 5 years ago
- direct systemcalls with a modern c++20 interface.☆45Updated 3 years ago
- Open Anti Cheat☆27Updated 3 years ago
- ☆53Updated 3 years ago
- Intel Virtualization Technology demo☆74Updated 9 years ago
- ☆44Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Updated 7 years ago
- using gpuz to load driver☆36Updated 6 years ago
- a frame of amd-v svm nest☆53Updated 5 years ago
- ☆35Updated 5 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 4 years ago
- ☆24Updated 6 years ago
- ☆24Updated 7 years ago
- An ark tool's driver☆40Updated 8 years ago
- Kernel Hook X64☆26Updated 5 years ago
- Automatically exported from code.google.com/p/wskudp☆43Updated 10 years ago
- map driver to memory☆26Updated 7 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆87Updated 6 years ago
- APEX-EACBypass(usermode)☆48Updated 6 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago