zoand / BOOMLinks
A Memory Read And Write the Hide Driver
☆72Updated 5 years ago
Alternatives and similar repositories for BOOM
Users that are interested in BOOM are comparing it to the libraries listed below
Sorting:
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆54Updated last year
- ☆69Updated 3 years ago
- ☆192Updated 2 years ago
- 不使用3环挂钩进行DWM桌面绘制☆81Updated 4 years ago
- ShotHv☆150Updated 3 years ago
- Example of reading process memory through kernel special APC☆109Updated 2 years ago
- ☆144Updated 3 years ago
- ☆173Updated 3 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆77Updated 3 years ago
- noob hooking dwm for overlay☆83Updated 5 years ago
- ☆81Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆201Updated 2 years ago
- 内核驱动加载/卸载痕迹清理,努力绕过反作弊吧 PiDDBCacheTable and MmLastUnloadedDriver☆183Updated 2 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆113Updated 7 months ago
- ☆147Updated last year
- A perfect driver for game hack☆103Updated 2 weeks ago
- Use RTCore64 to map your driver on windows 11.☆140Updated 8 months ago
- ☆43Updated last year
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆98Updated last year
- ☆183Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 4 years ago
- 兼容且隐蔽的DWM HOOK☆64Updated 3 years ago
- ☆24Updated 2 years ago
- ☆66Updated 2 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆94Updated 4 years ago
- ☆48Updated 3 years ago
- ☆103Updated 3 years ago
- Windows Kernel Misc☆24Updated 2 years ago