ranni0225 / WRKLinks
Windows Research Kernel
☆38Updated 4 months ago
Alternatives and similar repositories for WRK
Users that are interested in WRK are comparing it to the libraries listed below
Sorting:
- windows kernel pagehook☆41Updated 3 years ago
- A poc that abuses Enclave☆40Updated 3 years ago
- ☆24Updated 2 years ago
- ☆19Updated last year
- ☆29Updated last year
- partially disable patchguard up to win11 21H2☆19Updated last year
- ☆23Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Updated 7 years ago
- WinDbg-Samples ExdiGdbSrv fork 修复了一部分Vmware调试的问题☆31Updated 2 years ago
- ☆23Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 3 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54Updated 2 years ago
- detect hypervisor with Nmi Callback☆42Updated 3 years ago
- ☆37Updated last year
- Static Library For Windows Drivers☆41Updated last month
- direct systemcalls with a modern c++20 interface.☆45Updated 3 years ago
- anti cheat drv open source☆19Updated last year
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Updated 3 years ago
- Based on minhook☆34Updated 2 years ago
- 对Windbg以Exdi模式下调试windows做一些修复☆21Updated 2 years ago
- ☆34Updated 2 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- bootkit驱动映射,三环进程注入加载指定模块☆14Updated last year
- InfinityHookProMax: Make InfinityHook great great again☆52Updated 2 years ago
- intel vt-x type 2 hypervisor☆61Updated 9 months ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32Updated 3 years ago
- Open Anti Cheat☆27Updated 3 years ago