zouxianyu / KernelHiddenExecuteLinks
Hide codes/data in the kernel address space.
☆188Updated 4 years ago
Alternatives and similar repositories for KernelHiddenExecute
Users that are interested in KernelHiddenExecute are comparing it to the libraries listed below
Sorting:
- ☆116Updated 6 years ago
- ☆127Updated 5 years ago
- ☆163Updated 5 years ago
- Collect different versions of Crucial modules.☆144Updated last year
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆147Updated 4 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆154Updated 6 years ago
- ☆155Updated 6 years ago
- the basic version of the ring0 physical memory read/write tool☆91Updated 6 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆197Updated 9 years ago
- ayy debuger☆89Updated last year
- Easy Anti PatchGuard☆223Updated 4 years ago
- ShotHv☆150Updated 3 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆108Updated 6 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Updated 5 years ago
- A hypervisor hiding user-mode memory using EPT☆107Updated 7 years ago
- hook msr by amd svm☆125Updated 6 years ago
- Kernel LdrLoadDll injector☆265Updated 7 years ago
- ☆173Updated 3 years ago
- 滥用cow机制进行全局注入☆99Updated 5 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆145Updated 2 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆97Updated 2 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆85Updated 6 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 3 years ago
- Hide Driver By MiProcessLoaderEntry☆292Updated 6 years ago
- ☆185Updated 6 years ago
- An Ark tool project,run on Win7 x86/x64☆118Updated 8 years ago
- ☆81Updated 3 years ago
- KDMAPPER build [1809,1903,1909,2004]☆74Updated 5 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago