skrandy / ProtectYourProcessLinks
保护进程
☆24Updated 2 years ago
Alternatives and similar repositories for ProtectYourProcess
Users that are interested in ProtectYourProcess are comparing it to the libraries listed below
Sorting:
- ☆56Updated 3 years ago
- VT Hook☆50Updated last year
- 过TP驱动☆28Updated 5 years ago
- sc4cpp is a shellcode framework based on C++☆95Updated 4 years ago
- 不使用3环挂钩进行DWM桌面绘制☆82Updated 4 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆98Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- 自写驱动内存注入☆29Updated 4 years ago
- EtwHook for win7-win11;☆23Updated 3 years ago
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆22Updated last year
- ☆47Updated last year
- ☆53Updated 3 years ago
- Process path modification x64☆60Updated 7 years ago
- 一个windows内核驱动分析框架,对内核所有导出函数进行挂钩监控☆69Updated 2 months ago
- 以shellcode注入其它驱动执行,躲避驱动签名检测,曾pubg项目中使用,,,当然现在,,,☆27Updated 3 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Updated 4 years ago
- intel vt-x hypervisor ept☆25Updated 5 years ago
- Enum and Remove Hook in Windows☆48Updated last month
- 远程注入无导入函数dll,自动重定位以后内存加载dll☆49Updated 6 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 3 years ago
- ☆27Updated 2 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆40Updated 2 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆29Updated 4 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆55Updated 4 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆86Updated 3 years ago
- ☆26Updated 6 months ago
- GUI Kernel driver process protect tool☆38Updated 7 years ago
- InstDrv v2☆44Updated last year
- Windows kernel drivers simple HTTP library for modern C++☆40Updated 7 years ago
- 使用 Intel 虚拟化特性实现应用层HOOK☆65Updated 4 months ago