☆58Nov 14, 2017Updated 8 years ago
Alternatives and similar repositories for MemeInjector
Users that are interested in MemeInjector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Oct 16, 2017Updated 8 years ago
- Handle access elevation via direct kernel object manipulation☆117Jan 26, 2018Updated 8 years ago
- New handle stealing technique for windows apps☆14Oct 6, 2017Updated 8 years ago
- A library to manipulate physical memory from usermode.☆303Sep 5, 2023Updated 2 years ago
- ☆70Apr 10, 2020Updated 5 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- A Windows driver used to facilitate DLL injection☆27Oct 29, 2017Updated 8 years ago
- ☆103Nov 11, 2020Updated 5 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆226Nov 24, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- Player ESP 3D Box ESP Nametag ESP Lightweight Code Secure Injection Dedicated Cheat Launcher Secured Against Battleye Chicken Dinner…☆62Jul 19, 2023Updated 2 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- ☆37Sep 8, 2015Updated 10 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆420Jan 3, 2020Updated 6 years ago
- Wow64 syscall hook☆43May 28, 2017Updated 8 years ago
- Spoof Windows Test Signing Mode☆29Oct 13, 2018Updated 7 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- a method for undetectable breakpoints in 32-bit Windows programs☆13May 15, 2014Updated 11 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- hook sysenter,重载内核,下硬件断点到debugport,防止debugport清零☆25Dec 5, 2014Updated 11 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- An usermode alternative for DuplicateHandle.☆177Aug 12, 2017Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- A hypervisor hiding user-mode memory using EPT☆107Jan 28, 2018Updated 8 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- An ark tool's driver☆40May 11, 2017Updated 8 years ago
- An usermode BE Rootkit Bypass☆241May 1, 2019Updated 6 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago