Skip to content
View focuspadding's full-sized avatar

Block or report focuspadding

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

WindowsSecurity

Windows逆向编程、分析等
315 repositories

Kernel cheat with kernel hook for communication

C++ 295 55 Updated Jul 24, 2021

Cheat that uses a driver instead WinAPI for Reading / Writing memory.

C 742 160 Updated Jul 4, 2021

Universal graphical hook for a D3D9-D3D12, OpenGL and Vulkan based games.

C++ 1,028 219 Updated Aug 13, 2023

two types (external/internal) cheat examples, and game to test on.

C++ 13 5 Updated Oct 27, 2022

The functions interception library written on pure C and NativeAPI with UserMode and KernelMode support

C 726 152 Updated Oct 10, 2023

Nightshade is a Windows Memory Manipluation library specifically for injecting DLLs and Game Hacking

C++ 13 6 Updated Dec 12, 2022

A C++ library to create function hooks dynamically, so you can easily embed it into other programming languages..

C++ 53 12 Updated Feb 6, 2021

Virtual machines for iOS and macOS

Swift 27,014 1,344 Updated Nov 11, 2024

BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more

C 20,561 3,880 Updated Nov 9, 2024

Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)

HTML 2,176 333 Updated Oct 25, 2024

Windows drivers 开发的各个基础示例,包含进程、内存、注册表、回调等管理

C++ 161 78 Updated Dec 11, 2019

Driver that uses network sockets to communicate with client and read/ write protected process memory.

C 444 141 Updated Feb 22, 2019

A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original entrypoint.

C 92 21 Updated Sep 26, 2019

PE loader with various shellcode injection techniques

C++ 379 58 Updated Oct 17, 2022

A modal keyboard-driven virtual pointer

C 2,939 133 Updated Jul 12, 2024

Anti-Analysis technique, trick the debugger by Hiding events from it.

C++ 18 6 Updated Sep 6, 2021

Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.

C++ 18 7 Updated Sep 5, 2021

Process Injection Techniques with Golang

Go 75 16 Updated May 29, 2020

The official Windows Driver Kit DDI reference documentation sources

249 282 Updated Nov 11, 2024

a method for undetectable breakpoints in 32-bit Windows programs

C++ 13 9 Updated May 15, 2014

Run a Exe File (PE Module) in memory (like an Application Loader)

C++ 858 169 Updated Mar 28, 2021

Post-exploitation tool for hiding processes from monitoring applications

C++ 717 174 Updated Jun 18, 2023

A free Windows-compatible Operating System

C 14,735 1,757 Updated Nov 12, 2024

Windows内核安全与驱动开发书附赠的光盘源码

C 88 41 Updated Apr 16, 2018

Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs

C 287 37 Updated Sep 28, 2022

Windows x64 Driver Signature Enforcement Overrider

C 718 249 Updated Dec 4, 2018

Page fault hook use ept (Intel Virtualization Technology)

C 175 84 Updated Oct 19, 2016

Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping

C 45 11 Updated Oct 9, 2022

A microkernel-based hackable operating system.

C 522 29 Updated Nov 11, 2024

Windows Research Kernel Source Code

C 623 177 Updated Mar 26, 2017