vxcall / ZwDetectMemoryRead
neat way to detect memory read using nt layer function.
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ZwDetectMemoryRead
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- ☆23Updated last year
- ☆26Updated last year
- Stealing signatures from pe files☆15Updated 2 years ago
- ☆12Updated 2 years ago
- ☆28Updated last year
- ☆19Updated 2 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Updated last year
- IO隐藏通信封装☆14Updated 3 years ago
- ☆15Updated 2 years ago
- VEH debug plugin☆13Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated last year
- manual mapping injector☆26Updated 2 years ago
- Walks through the 4-level paging structures in Windows x64☆13Updated last year
- direct systemcalls with a modern c++20 interface.☆41Updated last year
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆19Updated 9 months ago
- VT调试器插件搭配的CE☆14Updated 2 years ago
- ☆18Updated 2 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- pdb's function and global vars to offset☆10Updated last year
- ☆26Updated last year
- 巨硬☆15Updated last year
- Disable threat tracing from the kernel..☆12Updated 2 years ago
- Not mine. Only for saving☆21Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14Updated 4 years ago
- Register a callback from a Manually mapped kernel module☆12Updated 2 years ago
- anti cheat drv open source☆15Updated 6 months ago