moccajoghurt / MemWarsView external linksLinks
☆44Oct 7, 2018Updated 7 years ago
Alternatives and similar repositories for MemWars
Users that are interested in MemWars are comparing it to the libraries listed below
Sorting:
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 5 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- The Win32 Anti-Intrusion Library☆213May 30, 2019Updated 6 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Oct 4, 2018Updated 7 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆111Aug 10, 2020Updated 5 years ago
- Tiny Visual C++ library/example that allows you to inject CoreCLR (the .NET Core Runtime) into the current unmanaged process and execute …☆27Jul 13, 2020Updated 5 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Kernel Pool Monitor☆127Mar 6, 2022Updated 3 years ago
- ☆18Oct 12, 2014Updated 11 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- Manual PE image mapper☆66Aug 29, 2013Updated 12 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- Use Windows Management Instrumentation interfaces to perform actions on a Windows system from a Linux System☆16Mar 15, 2012Updated 13 years ago
- 请叫我跳跳虎☆32Dec 21, 2020Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Mar 2, 2019Updated 6 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- Tools for detouring functions in C/C++.☆33Apr 6, 2025Updated 10 months ago
- ayy debuger☆89Mar 3, 2024Updated last year
- RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, doc…☆72Sep 5, 2020Updated 5 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- ☆12Aug 28, 2017Updated 8 years ago