veil-ivy / kapc_injectorView external linksLinks
kernel to user mode APC injector
☆46Mar 19, 2022Updated 3 years ago
Alternatives and similar repositories for kapc_injector
Users that are interested in kapc_injector are comparing it to the libraries listed below
Sorting:
- ☆20May 17, 2022Updated 3 years ago
- collection of code snippets,windbg,python scripts and resources☆14Jul 11, 2022Updated 3 years ago
- ☆12Jun 30, 2019Updated 6 years ago
- D☆44May 3, 2021Updated 4 years ago
- Windows Kernel Driver dlls injector using APC☆64Aug 11, 2018Updated 7 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Kernel Inject Process☆11Jul 28, 2017Updated 8 years ago
- simple undetect esp☆12Mar 19, 2024Updated last year
- ☆17Apr 21, 2022Updated 3 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆49Feb 21, 2022Updated 3 years ago
- RWX Section Abusing☆16Nov 19, 2023Updated 2 years ago
- An Internal CS:GO cheat hook. Compile and cheat.☆12Aug 31, 2023Updated 2 years ago
- G-Presto Anti-Cheat Reverse Engineered.☆26Jun 8, 2022Updated 3 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Executes Read/Write process memory with `NtQueryCompositionSurfaceStatistics`☆23Feb 10, 2024Updated 2 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- ☆15Sep 26, 2021Updated 4 years ago
- Simple Kernelmode DLL Injector with Manual mapping☆335Nov 29, 2023Updated 2 years ago
- ☆74Jan 15, 2022Updated 4 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆382Jan 29, 2022Updated 4 years ago
- ☆12Sep 3, 2022Updated 3 years ago
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Feb 22, 2023Updated 2 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- Tutorial & a blog post that demonstrate how to code a Windows driver to inject a custom DLL into all running processes. I coded it from s…☆142Aug 2, 2021Updated 4 years ago
- 热门网络游戏辅助开发教程☆19May 27, 2021Updated 4 years ago
- ☆25May 21, 2021Updated 4 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- 无痕注入1☆77Jun 1, 2021Updated 4 years ago
- ☆24Mar 4, 2019Updated 6 years ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆72Jul 27, 2024Updated last year
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- ☆26Dec 29, 2021Updated 4 years ago