Stars
awesome game security [Welcome to PR]
An x64 page table iterator written in C++ as a kernel mode windows driver.
http://learnopengl.com 系列教程的简体中文翻译
PoC memory injection detection agent based on ETW, for offensive and defensive research purposes
《关于编写 x64 Windows 10 驱动以了解虚拟内存这件事》系列视频附带的代码和材料
Windows X64 mode use seh in manual mapped dll or manual mapped sys
Collection of undocumented Windows API declarations.
VirtualKD-Redux - A revival and modernization of VirtualKD
A C compiler targeting an artistically pleasing nightmare for reverse engineers
A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level security.
Read Memory without ReadProcessMemory for Current Process
Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.
An easy-to-use and competitively fast JSON parsing library for C++17, forked from Bitcoin Cash Node's own UniValue library.
可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。
fengjixuchui / NullHook
Forked from NullTerminatorr/NullHookKernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm and even draw rectangles for esp. This was made to hack video…
library for importing functions from dlls in a hidden, reverse engineer unfriendly way