neat way to detect memory read using nt layer function.
☆14Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for ZwDetectMemoryRead
Users that are interested in ZwDetectMemoryRead are comparing it to the libraries listed below
Sorting:
- ☆69Aug 31, 2021Updated 4 years ago
- Open source anti cheat engine☆43Jul 9, 2024Updated last year
- squad internal simple base☆19Nov 29, 2023Updated 2 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- anti crack system protector☆108Nov 27, 2023Updated 2 years ago
- ☆19Apr 9, 2024Updated last year
- Simple handler for bypass battleye in 5 seconds☆11May 23, 2021Updated 4 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- ☆14Dec 6, 2022Updated 3 years ago
- KNSoft.NDK provides native C/C++ definitions and import libraries for Windows NT.☆21Feb 22, 2026Updated 3 weeks ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Oct 2, 2020Updated 5 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- 可 在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- A simple anti-crack system☆21Jan 12, 2022Updated 4 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- partially disable patchguard up to win11 21H2☆19Jun 3, 2024Updated last year
- ☆18Dec 4, 2020Updated 5 years ago
- 基于Intel-VT技术的windows内核增强型驱动☆30Jun 9, 2022Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆83Dec 9, 2021Updated 4 years ago
- Nightshade is a Windows Memory Manipluation library specifically for injecting DLLs and Game Hacking☆13Dec 12, 2022Updated 3 years ago
- Execute anything in a legit memory region by attacking a windows driver☆20Aug 20, 2023Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- Intel learning hypervisor and some extend function☆23Aug 23, 2025Updated 6 months ago
- A debugger library using VEH.☆69Sep 3, 2024Updated last year
- ☆11Sep 25, 2021Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆202Jul 11, 2023Updated 2 years ago
- farlight84 cheat☆17Nov 29, 2023Updated 2 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆87Apr 3, 2019Updated 6 years ago
- A wrapper class to hide the original calling address of a function☆54Aug 9, 2020Updated 5 years ago
- VEH debug plugin☆13Apr 28, 2022Updated 3 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Sep 12, 2022Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago