zouxianyu / PhysicalMemoryRWLinks
the basic version of the ring0 physical memory read/write tool
☆88Updated 6 years ago
Alternatives and similar repositories for PhysicalMemoryRW
Users that are interested in PhysicalMemoryRW are comparing it to the libraries listed below
Sorting:
- ayy debuger☆89Updated last year
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆82Updated 6 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- ☆125Updated 5 years ago
- first commit☆63Updated 4 years ago
- ☆99Updated 7 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- 使用vt进行无痕hook,支持r3☆60Updated 6 years ago
- Hook system calls, context switches, page faults and more.☆35Updated 6 years ago
- VT Hook☆47Updated last year
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆69Updated 4 years ago
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆93Updated 4 years ago
- Windows Driver Kit Extesion Header (Undoc)☆136Updated 3 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆95Updated 2 years ago
- ☆70Updated 3 years ago
- Collect different versions of Crucial modules.☆144Updated last year
- A hypervisor hiding user-mode memory using EPT☆109Updated 7 years ago
- Hide codes/data in the kernel address space.☆189Updated 4 years ago
- Intel Virtualization Technology demo☆69Updated 8 years ago
- ☆27Updated 7 years ago
- Process path modification x64☆56Updated 7 years ago
- win10 pgContext dynamic dump (btc version)☆107Updated 5 years ago
- ☆80Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆110Updated 2 years ago
- ☆139Updated 2 years ago
- Communication via callback☆72Updated 5 years ago
- ☆114Updated 5 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆74Updated 2 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆66Updated 6 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago