最有用的开源C/C++资源。
☆13Apr 9, 2018Updated 7 years ago
Alternatives and similar repositories for awesome-cpp
Users that are interested in awesome-cpp are comparing it to the libraries listed below
Sorting:
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- [POC Detected]Bypass BE Anti Dll Injection (POC/Need Driver)☆17Mar 30, 2020Updated 5 years ago
- x86 virtualization study notes using Intel VT-x☆22Jan 3, 2014Updated 12 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- Kindly Win x86/x64 DLL Injector☆15Aug 17, 2019Updated 6 years ago
- POC - x64 injector -> x86 injectee dll injector☆15Apr 4, 2024Updated last year
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆17Mar 14, 2025Updated 11 months ago
- 游戏辅助练手合集☆22May 9, 2025Updated 9 months ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- A VM and VT detection vector,detects KVM,VMware,HYPER-V,Hypervisor and ...(Intel Only)☆21Nov 12, 2020Updated 5 years ago
- 一个根据google maglev 论文,用c语言实现的一致性hash算法☆19Apr 28, 2020Updated 5 years ago
- TLB Splitting with intel vt-d and KVM☆21Oct 18, 2017Updated 8 years ago
- intel vt-x hypervisor ept☆25May 19, 2020Updated 5 years ago
- APC注入DLL内核层☆23Dec 8, 2018Updated 7 years ago
- A tool to sample a QEMU-KVM's memory access pattern at page level based on Intel VT-x☆23Feb 21, 2019Updated 7 years ago
- Presentation and code for C++ and System Software Summit (China) 2016☆21Jan 24, 2021Updated 5 years ago
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Jan 2, 2021Updated 5 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆27Aug 3, 2019Updated 6 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆34Dec 27, 2020Updated 5 years ago
- hook sysenter,重载内核,下硬件断点到debugport,防止debugport清零☆25Dec 5, 2014Updated 11 years ago
- Use the Cheat Engine driver in your own process!☆25Jul 1, 2018Updated 7 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Kernel mode to user mode dll injection.☆14Nov 10, 2024Updated last year
- Library for using direct system calls☆36Jan 30, 2025Updated last year
- DBKKernel used by Cheat Engine. Specially revised for VS2017 win10.☆34Jan 8, 2018Updated 8 years ago
- A Type-1 hypervisor aimed to implement kernel hotswapping☆30Feb 8, 2024Updated 2 years ago
- The dll that can hide itself and then delete itselft.☆32Mar 31, 2013Updated 12 years ago
- GUI Kernel driver process protect tool☆38Jul 13, 2018Updated 7 years ago
- 基于Intel-VT技术的windows内核增强型驱动☆30Jun 9, 2022Updated 3 years ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆33Nov 3, 2019Updated 6 years ago
- old bypass☆34Aug 26, 2018Updated 7 years ago
- nProtect GameGuard☆34Feb 21, 2021Updated 5 years ago
- 二维码扫描、生成☆11Sep 6, 2013Updated 12 years ago
- A driver created to bypass the anti-cheat and r/w memory through it☆15Aug 3, 2024Updated last year
- OpenSrc projects; common multiprojects headers store to ./Common/*category*/☆51Mar 16, 2014Updated 11 years ago
- inject dll from kernal mode to user mode process use Apc☆33Feb 10, 2020Updated 6 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆38Sep 27, 2015Updated 10 years ago
- 每天一个技术点☆10Sep 10, 2023Updated 2 years ago