☆44Oct 7, 2018Updated 7 years ago
Alternatives and similar repositories for MemWars
Users that are interested in MemWars are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆99Oct 6, 2017Updated 8 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 6 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆36Jun 13, 2020Updated 5 years ago
- ☆12Aug 28, 2017Updated 8 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- ☆32Oct 31, 2018Updated 7 years ago
- The Win32 Anti-Intrusion Library☆214May 30, 2019Updated 6 years ago
- ☆18Oct 12, 2014Updated 11 years ago
- init☆14Mar 16, 2020Updated 6 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Jul 20, 2020Updated 5 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Kernel Pool Monitor☆128Mar 6, 2022Updated 4 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆78Oct 4, 2018Updated 7 years ago
- ☆16Oct 7, 2020Updated 5 years ago
- Some garbage drivers written for getting started☆64Dec 31, 2019Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆17Apr 30, 2020Updated 5 years ago
- ☆124May 23, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Hide codes/data in the kernel address space.☆187May 8, 2021Updated 4 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- ☆48Jun 19, 2017Updated 8 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆58Sep 12, 2019Updated 6 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 7 years ago