ninetails0 / Kernel-Driver-Read-Write-Memory-GDI-OverlayLinks
Driver hooks a function from NT windows. read/write memory and use windows GDI to draw on buffer from kernel.
☆36Updated 3 years ago
Alternatives and similar repositories for Kernel-Driver-Read-Write-Memory-GDI-Overlay
Users that are interested in Kernel-Driver-Read-Write-Memory-GDI-Overlay are comparing it to the libraries listed below
Sorting:
- ☆53Updated 2 years ago
- clearing traces of a loaded driver☆47Updated 2 years ago
- ☆48Updated 3 years ago
- InfinityHookProMax: Make InfinityHook great great again☆45Updated last year
- Windows Kernel Misc☆23Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆91Updated 2 years ago
- ☆46Updated 3 years ago
- A simple MmCopyMemory hook.☆38Updated 2 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- ☆69Updated 3 years ago
- ☆74Updated 2 years ago
- ☆21Updated 2 years ago
- ☆47Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Updated 5 years ago
- 将驱动映射到会话空间☆35Updated 2 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆43Updated last year
- Only for Stress-Testing☆24Updated 3 years ago
- A library to assist with memory & code protection.☆59Updated last year
- Compile-Time Strings and Numbers Encryption for C++20☆51Updated 4 months ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- ☆138Updated 2 years ago
- page table manipulation to gain physical r/w☆42Updated last year
- ☆42Updated 3 years ago
- ☆63Updated 2 years ago
- ☆50Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆51Updated last year
- ☆69Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago