zoand / BOOMLinks
A Memory Read And Write the Hide Driver
☆72Updated 5 years ago
Alternatives and similar repositories for BOOM
Users that are interested in BOOM are comparing it to the libraries listed below
Sorting:
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆55Updated last year
- 不使用3环挂钩进行DWM桌面绘制☆82Updated 4 years ago
- Example of reading process memory through kernel special APC☆110Updated 2 years ago
- ☆144Updated 3 years ago
- ☆192Updated 2 years ago
- ShotHv☆152Updated 3 years ago
- ☆173Updated 3 years ago
- noob hooking dwm for overlay☆84Updated 5 years ago
- ☆45Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆204Updated 2 years ago
- 兼容且隐蔽的DWM HOOK☆64Updated 3 years ago
- Use RTCore64 to map your driver on windows 11.☆145Updated 8 months ago
- ☆102Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Updated 4 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆96Updated 4 years ago
- ☆182Updated 3 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆117Updated 8 months ago
- 内核驱动加载/卸载痕迹清理,努力绕过反作弊吧 PiDDBCacheTable and MmLastUnloadedDriver☆187Updated 2 years ago
- ☆159Updated last year
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Updated 5 years ago
- A perfect driver for game hack☆105Updated last month
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Updated 4 years ago
- ☆148Updated 2 years ago
- PTE hook☆33Updated last year
- Windows Kernel Misc☆25Updated 2 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆97Updated 2 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Updated 3 years ago
- 滥用cow机制进行全局注入☆99Updated 5 years ago