zoand / BOOM
A Memory Read And Write the Hide Driver
☆66Updated 4 years ago
Alternatives and similar repositories for BOOM:
Users that are interested in BOOM are comparing it to the libraries listed below
- ☆68Updated 3 years ago
- ☆131Updated 2 years ago
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆40Updated 11 months ago
- ☆54Updated 2 years ago
- Use RTCore64 to map your driver on windows 11.☆104Updated last month
- 不使用3环挂钩进行DWM桌面绘制☆80Updated 3 years ago
- ☆178Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- ☆164Updated 3 years ago
- ☆51Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆112Updated 3 years ago
- noob hooking dwm for overlay☆80Updated 4 years ago
- 从MmPfnData中枚举进程和页目录基址☆167Updated last year
- 兼容且隐蔽的DWM HOOK☆57Updated 2 years ago
- ☆91Updated 3 years ago
- ☆157Updated 2 years ago
- A perfect driver for game hack☆72Updated 2 months ago
- InjectDll☆54Updated 6 years ago
- ☆35Updated 6 months ago
- Example of reading process memory through kernel special APC☆104Updated last year
- ShotHv☆137Updated 3 years ago
- 内核驱动加载/卸载痕迹清理,努力绕过反作弊吧 PiDDBCacheTable and MmLastUnloadedDriver☆146Updated 2 years ago
- ☆140Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- VT DEBUGGER☆70Updated 2 years ago
- Windows Kernel Misc☆23Updated last year
- ☆80Updated 3 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆85Updated 2 weeks ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆93Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆93Updated 2 years ago