wbaby / DoubleCallBackLinks
☆180Updated 3 years ago
Alternatives and similar repositories for DoubleCallBack
Users that are interested in DoubleCallBack are comparing it to the libraries listed below
Sorting:
- Kernel dwm render☆162Updated 2 years ago
- r/w virtual memory without attach☆202Updated 2 years ago
- ☆184Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆187Updated 2 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆167Updated last year
- VT DEBUGGER☆90Updated 2 years ago
- ☆217Updated 2 years ago
- DWM Overlay without write .text☆103Updated last year
- ☆169Updated 3 years ago
- Standard Kernel Library for Windows manipulation in C++☆188Updated 4 months ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆91Updated last year
- A very simple C++ library for download pdb, get rva of function, global variable and offset from struct.☆152Updated last year
- ☆145Updated last year
- A perfect driver for game hack☆93Updated 9 months ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆110Updated 5 months ago
- 内核驱动加载/卸载痕迹清理,努力绕过反作弊吧 PiDDBCacheTable and MmLastUnloadedDriver☆171Updated 2 years ago
- ☆143Updated 2 years ago
- ☆64Updated 2 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆153Updated 2 years ago
- ☆99Updated 3 years ago
- ☆24Updated 2 years ago
- A Memory Read And Write the Hide Driver☆72Updated 4 years ago
- (communication detected)a kernel driver for game cheater. includes read&write memory / key&mouse simulator / kernel DWM render / process …☆97Updated 6 months ago
- ShotHv☆148Updated 3 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆51Updated last year
- Use RTCore64 to map your driver on windows 11.☆138Updated 6 months ago
- PUBG-SDK☆42Updated 10 months ago
- Drawing from kernelmode without any hooks☆173Updated 3 years ago
- ☆40Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago