zoand / BOOMLinks
A Memory Read And Write the Hide Driver
☆69Updated 4 years ago
Alternatives and similar repositories for BOOM
Users that are interested in BOOM are comparing it to the libraries listed below
Sorting:
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆45Updated last year
- ☆70Updated 3 years ago
- 一个简单的驱动☆59Updated last year
- ☆138Updated 2 years ago
- 不使用3环挂钩进行DWM桌面绘制☆81Updated 3 years ago
- noob hooking dwm for overlay☆80Updated 4 years ago
- ☆184Updated 2 years ago
- ☆170Updated 3 years ago
- Example of reading process memory through kernel special APC☆108Updated 2 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆93Updated 4 years ago
- ShotHv☆144Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆180Updated last year
- ☆80Updated 3 years ago
- Use RTCore64 to map your driver on windows 11.☆123Updated 2 months ago
- ☆37Updated 9 months ago
- 兼容且隐蔽的DWM HOOK☆58Updated 3 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆72Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆138Updated 4 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆96Updated last month
- Windows Kernel Misc☆23Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆114Updated 3 years ago
- ☆155Updated last year
- ☆170Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 2 years ago
- Hide Process☆59Updated 11 months ago
- ☆48Updated 3 years ago
- Driver hooks a function from NT windows. read/write memory and use windows GDI to draw on buffer from kernel.☆36Updated 3 years ago
- ☆98Updated 3 years ago
- 滥用cow机制进行全局注入☆98Updated 4 years ago