bypass CRC
☆12May 3, 2018Updated 7 years ago
Alternatives and similar repositories for shadowMap
Users that are interested in shadowMap are comparing it to the libraries listed below
Sorting:
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- fork HoShiMin Avanguard☆20Sep 29, 2018Updated 7 years ago
- Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with…☆15Dec 23, 2020Updated 5 years ago
- ☆16Mar 1, 2019Updated 7 years ago
- A Memory Read And Write the Hide Driver☆72Dec 2, 2020Updated 5 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- ☆12Aug 28, 2017Updated 8 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- ☆13Mar 27, 2020Updated 5 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- ☆12Nov 6, 2017Updated 8 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- ☆47Nov 26, 2020Updated 5 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆108May 28, 2019Updated 6 years ago
- Achieving code execution through abusing vectored exception handling☆17May 28, 2023Updated 2 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Direct3D 11 Renderer☆10Jul 13, 2021Updated 4 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Mar 2, 2019Updated 7 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Written in a couple hours, don't judge :)☆17Jun 3, 2023Updated 2 years ago
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Nov 9, 2021Updated 4 years ago
- (shard of furikuri project) assambler for code obfuscation☆19Oct 29, 2019Updated 6 years ago
- Compileable POC of namazso's x64 return address spoofer.☆50Jun 10, 2020Updated 5 years ago
- draw rect in float view☆18Feb 7, 2022Updated 4 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago