yunshanwuyin / ProcessProtectLinks
基于ObRegisterCallbacks实现简单进程保护功能
☆29Updated 3 years ago
Alternatives and similar repositories for ProcessProtect
Users that are interested in ProcessProtect are comparing it to the libraries listed below
Sorting:
- Driver protect 驱动保护☆46Updated 5 years ago
- Reversing EasyAntiCheat.☆32Updated 6 years ago
- InjectDll☆57Updated 6 years ago
- ☆80Updated 3 years ago
- a monitoring windows driver calls kernel api tools☆115Updated last year
- old bypass☆34Updated 7 years ago
- 模仿PCHUNTER的ARK工具☆37Updated 5 years ago
- This is an extension to InfinityHookPro to support physical machine environments. (Win7 -> Win11 latest)☆34Updated 2 years ago
- ☆75Updated 3 years ago
- 快速内存搜索算法,商用级别☆130Updated 6 years ago
- Process path modification x64☆57Updated 7 years ago
- SymbolTypeViewer_汉化☆17Updated 5 years ago
- ☆27Updated last year
- first commit☆62Updated 4 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆52Updated 4 years ago
- 远程注入无导入函数dll,自动重定位以后内存加载dll☆48Updated 6 years ago
- ☆53Updated 2 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆94Updated 4 years ago
- ☆38Updated 11 months ago
- Intel Virtualization Technology demo☆69Updated 8 years ago
- ☆51Updated 2 years ago
- an encryption library designed for Windows kernel and driver programming☆117Updated 2 years ago
- ShotHv☆147Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 3 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆22Updated 5 years ago
- 不使用3环挂钩进行DWM桌面绘制☆79Updated 3 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆103Updated 3 months ago
- Scan Like a Cheat Engine☆29Updated 6 years ago
- EtwHook for win7-win11;☆22Updated 2 years ago
- 参考《Windows内核安全与驱动开发》的透明加密解密Minifilter☆72Updated 3 years ago