A Memory Read And Write the Hide Driver
☆73Dec 2, 2020Updated 5 years ago
Alternatives and similar repositories for BOOM
Users that are interested in BOOM are comparing it to the libraries listed below
Sorting:
- bypass CRC☆12May 3, 2018Updated 7 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆97May 25, 2021Updated 4 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Oct 10, 2022Updated 3 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆55Jul 24, 2021Updated 4 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- 使用vt进行无痕hook,支持r3☆61Feb 1, 2019Updated 7 years ago
- 不使用3环挂钩进行DWM桌面绘制☆82Dec 9, 2021Updated 4 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆154Jun 5, 2019Updated 6 years ago
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆87Apr 25, 2019Updated 6 years ago
- Exploits Intel's signed iqvw64e.sys driver to allow manual mapping and read/writing of memory at a kernel level.☆13Jun 1, 2019Updated 6 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- 过TP驱动☆28Feb 11, 2020Updated 6 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- ☆14May 10, 2021Updated 4 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- 基于Intel-VT技术的windows内核增强型驱动☆30Jun 9, 2022Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆203Feb 14, 2024Updated 2 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆288Jan 27, 2025Updated last year
- ☆148Jan 24, 2024Updated 2 years ago
- ☆110Nov 13, 2023Updated 2 years ago
- 无痕注入1☆77Jun 1, 2021Updated 4 years ago
- This is a simple project of a driver + usermode.☆169Jan 31, 2022Updated 4 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- A simple DLL injection protection driver.☆12Dec 21, 2020Updated 5 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- Swap control lioctl with trampoline recording in the .text section☆13Jul 1, 2021Updated 4 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆345Apr 27, 2020Updated 5 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Apr 1, 2023Updated 2 years ago